An Attack on a Dynamic Multi-Secret Sharing Scheme And Enhancing Its Security

被引:0
|
作者
Tadayon, M. H.
Khanmohammadi, H.
Arabi, S.
机构
关键词
Dynamic Multi Secret Sharing; Secure Channel; Verifiability; Cheating; Attack;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper we have analysed Zou and Zhang's scheme from the security point of view. An attack is proposed on verifiability and non secure channel in this paper. We have proved that this scheme needs a secure channel although this scheme has been proposed without a secure channel; in addition this scheme is not completely verifiable i.e. although the combiner verifies the scheme but the participants can cheat. Elliptic curves and bilinear maps together with the difficultly of solving discrete logarithm problems, a verifiable secret sharing scheme is proposed. Furthermore the proposed scheme has this property that all participants can select their shares; so the dealer can't cheat on the shares of participants. Security analyses show that our modifications on the proposed scheme solve both of the mentioned problems. In addition our modifications reduce the public values published by the dealer; so we have modified this scheme to an enhanced practical scheme.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] A novel approach for multilevel multi-secret image sharing scheme
    Bisht, Kanchan
    Deshmukh, Maroti
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (10): : 12157 - 12191
  • [42] An Efficient Multi-secret Sharing Scheme with General Access Structures
    Wei Yun
    Zhang Xingkai
    Xiong Guohua
    ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 1246 - 1250
  • [43] An Ideal Multi-secret Sharing Scheme Based on Connectivity of Graphs
    Hsu, Ching-Fang
    Harn, Lein
    Cui, Guohua
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (01) : 383 - 394
  • [44] General multi-secret sharing scheme for cheat-proof
    Gan, Yuan-Ju
    Xie, Shi-Yi
    Fu, Dong-Yang
    Li, Xiao-Li
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2008, 37 (01): : 68 - 69
  • [45] A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing
    Pang, LJ
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 840 - 848
  • [46] A new (t, n)-threshold multi-secret sharing scheme
    Li, HX
    Cheng, CT
    Pang, LJ
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 421 - 426
  • [47] A new multi-secret image sharing scheme based on DCT
    Chanu, Oinam Bidyapati
    Neelima, Arambam
    VISUAL COMPUTER, 2020, 36 (05): : 939 - 950
  • [48] An efficient Boolean based multi-secret image sharing scheme
    Amitava Nag
    Jyoti Prakash Singh
    Amit Kumar Singh
    Multimedia Tools and Applications, 2020, 79 : 16219 - 16243
  • [49] An efficient Boolean based multi-secret image sharing scheme
    Nag, Amitava
    Singh, Jyoti Prakash
    Singh, Amit Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (23-24) : 16219 - 16243
  • [50] Efficient Multi-secret Sharing Scheme Using Room Square
    Li, Ming-Jheng
    Chang, Ying-Hsuan
    Juan, Justie Su-Tzu
    2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 260 - 266