An Attack on a Dynamic Multi-Secret Sharing Scheme And Enhancing Its Security

被引:0
|
作者
Tadayon, M. H.
Khanmohammadi, H.
Arabi, S.
机构
关键词
Dynamic Multi Secret Sharing; Secure Channel; Verifiability; Cheating; Attack;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper we have analysed Zou and Zhang's scheme from the security point of view. An attack is proposed on verifiability and non secure channel in this paper. We have proved that this scheme needs a secure channel although this scheme has been proposed without a secure channel; in addition this scheme is not completely verifiable i.e. although the combiner verifies the scheme but the participants can cheat. Elliptic curves and bilinear maps together with the difficultly of solving discrete logarithm problems, a verifiable secret sharing scheme is proposed. Furthermore the proposed scheme has this property that all participants can select their shares; so the dealer can't cheat on the shares of participants. Security analyses show that our modifications on the proposed scheme solve both of the mentioned problems. In addition our modifications reduce the public values published by the dealer; so we have modified this scheme to an enhanced practical scheme.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] A hierarchical weighted threshold multi-secret sharing scheme
    Chang, CC
    Pan, YP
    Proceedings of the Second International Conference on Information and Management Sciences, 2002, 2 : 333 - 340
  • [22] A new multi-secret sharing scheme with multi-policy
    Geng Yong-Jun
    Fan Xiao-Hong
    Hong Fan
    9th International Conference on Advanced Communication Technology: Toward Network Innovation Beyond Evolution, Vols 1-3, 2007, : 1515 - 1517
  • [23] A practical (t, n) multi-secret sharing scheme
    Chien, HY
    Jan, JK
    Tseng, YM
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (12) : 2762 - 2765
  • [24] A new double layer multi-secret sharing scheme
    Gunasekaran, Elavarasi
    Muthuraman, Vanitha
    CHINA COMMUNICATIONS, 2024, 21 (01) : 287 - 309
  • [25] Multi-secret sharing scheme based on cellular automata
    Institute of Hydropower System and Hydroinformatics, Dalian Univ. of Tech, Dalian 116024, China
    不详
    不详
    Xitong Gongcheng Lilum yu Shijian, 2006, 6 (113-116):
  • [26] Design and Analysis of a New Multi-secret Sharing Scheme
    Liu Feng
    Gao Dong-Mei
    2009 ETP INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATION (FCC 2009), 2009, : 241 - 243
  • [27] An ideal multi-secret sharing scheme based on MSP
    Hsu, Ching-Fang
    Cheng, Qi
    Tang, Xueming
    Zeng, Bing
    INFORMATION SCIENCES, 2011, 181 (07) : 1403 - 1409
  • [28] Multi-secret sharing scheme with general access structures
    Li, Hui-Xian
    Cheng, Chun-Tian
    Pang, Liao-Jun
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2006, 34 (06): : 95 - 98
  • [29] AN IDEAL MULTI-SECRET SHARING SCHEME BASED ON MSP
    Hei, Zan
    Li, Zhi-Hui
    Wu, Xingxing
    QUANTITATIVE LOGIC AND SOFT COMPUTING, 2012, 5 : 246 - 251
  • [30] Secure secret reconstruction and multi-secret sharing schemes with unconditional security
    Harn, Lein
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (03) : 567 - 573