Unconditionally non-interactive verifiable secret sharing secure against faulty majorities in the commodity based model

被引:0
|
作者
Nascimento, ACA
Mueller-Quade, J
Otsuka, A
Hanaoka, G
Imai, H
机构
[1] Univ Tokyo, Inst Ind Sci, Meguro Ku, Tokyo 1538505, Japan
[2] Univ Karlsruhe, Inst Algorithmen & Kognit Syst, D-76128 Karlsruhe, Germany
关键词
verifiable secret sharing; pre-distributed data; multiparty protocols;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a non-interactive verifiable secret sharing scheme (VSS) tolerating a dishonest majority based on data predistributed by a trusted authority. As an application of this VSS scheme we present very efficient unconditionally secure multiparty protocols based on predistributed data which generalize two-party computations based on linear predistributed bit commitments. The main results of this paper are a non-interactive VSS where the amount of data which needs to be predistributed to each player depends on the number of tolerable cheaters only, a simplified multiplication protocol for shared values based on predistributed random products, a protocol for fair exchange of secrets based on predistributed data, and non-interactive zero knowledge proofs for arbitrary polynomial relations.
引用
收藏
页码:355 / 368
页数:14
相关论文
共 50 条
  • [31] Non-Interactive and secure outsourcing of PCA-Based face recognition
    Ren, Yanli
    Xu, Xiao
    Feng, Guorui
    Zhang, Xinpeng
    COMPUTERS & SECURITY, 2021, 110
  • [32] Mobile agent protection based on non-interactive secure function evaluation
    Wu, Jian-Jun
    Gao, Ji
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2004, 38 (07): : 848 - 850
  • [33] A secure non-interactive deniable authentication protocol based on discrete logarithms
    Chuang, Yu-Hao
    Shu, Wesley
    Hsu, Kevin C.
    Hsu, Chien-Lung
    ICIC Express Letters, Part B: Applications, 2012, 3 (03): : 507 - 512
  • [34] InfinityRand: Blockchain Non-Interactive Randomness Beacon Protocol Based on Trapdoor Verifiable Delay Function
    Zhang, Jingyu
    Ou, Jiejun
    Lan, Di
    Ma, Bojian
    Luo, Lailong
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 1621 - 1626
  • [35] Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
    Dowsley, Rafael
    Mueller-Quade, Joern
    Otsuka, Akira
    Hanaoka, Goichiro
    Imai, Hideki
    Nascimento, Anderson C. A.
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) : 725 - 734
  • [36] A new probabilistic ID-based non-interactive key sharing scheme
    Murakami, Y
    Sakai, R
    Kasahara, M
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (01) : 2 - 9
  • [37] Provably secure verifiable multi-stage secret sharing scheme based on monotone span program
    Mashhadi, Samaneh
    Dehkordi, Massoud Hadian
    Kiamari, Niloofar
    IET INFORMATION SECURITY, 2017, 11 (06) : 326 - 331
  • [38] A secure non-interactive chaotic maps-based deniable authentication scheme with privacy protection in standard model
    Zhu H.
    Zhang Y.
    Journal of Computers (Taiwan), 2018, 29 (03) : 109 - 120
  • [39] A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography
    Chuang, Yu-Hao
    Hsu, Chien-Lung
    Shu, Wesley
    Hsu, Kevin C.
    Liao, Min-Wen
    NEW TRENDS IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2015, 598 : 183 - 190
  • [40] Game-based security proofs for verifiable secret sharing schemes in the standard model
    Mashhadi, Samaneh
    INFORMATION SECURITY JOURNAL, 2023, 32 (03): : 163 - 172