An Attack on a Dynamic Multi-Secret Sharing Scheme And Enhancing Its Security

被引:0
|
作者
Tadayon, M. H.
Khanmohammadi, H.
Arabi, S.
机构
关键词
Dynamic Multi Secret Sharing; Secure Channel; Verifiability; Cheating; Attack;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper we have analysed Zou and Zhang's scheme from the security point of view. An attack is proposed on verifiability and non secure channel in this paper. We have proved that this scheme needs a secure channel although this scheme has been proposed without a secure channel; in addition this scheme is not completely verifiable i.e. although the combiner verifies the scheme but the participants can cheat. Elliptic curves and bilinear maps together with the difficultly of solving discrete logarithm problems, a verifiable secret sharing scheme is proposed. Furthermore the proposed scheme has this property that all participants can select their shares; so the dealer can't cheat on the shares of participants. Security analyses show that our modifications on the proposed scheme solve both of the mentioned problems. In addition our modifications reduce the public values published by the dealer; so we have modified this scheme to an enhanced practical scheme.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction
    Lin, Changlu
    Hu, Huidan
    Chang, Chin-Chen
    Tang, Shaohua
    IEEE ACCESS, 2018, 6 : 70666 - 70673
  • [32] Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps
    Tadayon, Mohammad Hesam
    Khanmohammadi, Hadi
    Haghighi, Mohammad Sayad
    IET INFORMATION SECURITY, 2015, 9 (04) : 234 - 239
  • [33] Cheat-proof dynamic (t, n) threshold multi-secret sharing scheme
    Gan, Yuan-Ju
    Xie, Shi-Yi
    Fu, Dong-Yang
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2006, 38 (06): : 131 - 134
  • [34] Dynamic Threshold Multi-secret Sharing Scheme Using Elliptic Curve and Bilinear Maps
    Wang, Shiuh-Jeng
    Tsai, Yuh-Ren
    Shen, Jian-Jhih
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 883 - +
  • [35] Multi-secret sharing scheme based on the general access structure
    Pang, Liaojun
    Jiang, Zhengtao
    Wang, Yumin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2006, 43 (01): : 33 - 38
  • [36] A novel approach for multilevel multi-secret image sharing scheme
    Kanchan Bisht
    Maroti Deshmukh
    The Journal of Supercomputing, 2021, 77 : 12157 - 12191
  • [37] A new multi-secret image sharing scheme based on DCT
    Oinam Bidyapati Chanu
    Arambam Neelima
    The Visual Computer, 2020, 36 : 939 - 950
  • [38] A Secure and Efficient (t, n) Multi-Secret Sharing Scheme
    PANG Liao-jun
    WuhanUniversityJournalofNaturalSciences, 2005, (01) : 191 - 194
  • [39] A verifiable multi-secret sharing scheme based on cellular automata
    Eslami, Z.
    Ahmadabadi, J. Zarepour
    INFORMATION SCIENCES, 2010, 180 (15) : 2889 - 2894
  • [40] An efficient (t, n) multi-secret sharing scheme with verification
    Pang, L. J.
    Li, H. X.
    Jiao, L. C.
    Wang, Y. M.
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 552 - 557