(t,n) multi-secret sharing scheme extended from Harn-Hsu’s scheme

被引:0
|
作者
Tong Zhang
Xizheng Ke
Yanxiao Liu
机构
[1] Xi’an University of Technology,Department of Computer Science and Engineering
关键词
Secret sharing scheme; Multiple secrets; Asynchronous; Bivariate polynomial;
D O I
暂无
中图分类号
学科分类号
摘要
Multi-secret sharing scheme has been well studied in recent years. In most multi-secret sharing schemes, all secrets must be recovered synchronously; the shares cannot be reused any more. In 2017, Harn and Hsu proposed a novel and reasonable feature in multiple secret sharing, such that the multiple secrets should be reconstructed asynchronously and the recovering of previous secrets do not leak any information on unrecovered secrets. Harn and Hsu also proposed a (t,n) multi-secret sharing scheme that satisfies this feature. However, the analysis on Harn-Hsu’s scheme is wrong, and their scheme fails to satisfy this feature. If one secret is reconstructed, all the other unrecovered secrets can be computed by any t − 1 shareholders illegitimately. Another problem in Harn-Hsu’s work is that the parameters are unreasonable which will be shown as follows. In this paper, we prove the incorrectness of Harn-Hsu’s scheme and propose a new (t,n) multi-secret sharing scheme which is extended from Harn-Hsu’s scheme; our proposed scheme satisfies the feature introduced by Harn and Hsu.
引用
收藏
相关论文
共 50 条
  • [1] (t, n) multi-secret sharing scheme extended from Harn-Hsu's scheme
    Zhang, Tong
    Ke, Xizheng
    Liu, Yanxiao
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
  • [2] A (t, n) multi-secret sharing scheme
    Yang, CC
    Chang, TY
    Hwang, MS
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 151 (02) : 483 - 490
  • [3] A New (t, n) Multi-secret Sharing Scheme
    Tan, Xiao-qing
    Wang, Zhi-guo
    ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 861 - +
  • [4] A practical (t, n) multi-secret sharing scheme
    Chien, HY
    Jan, JK
    Tseng, YM
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (12) : 2762 - 2765
  • [5] A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing
    Pang, LJ
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 840 - 848
  • [6] A Secure and Efficient (t, n) Multi-Secret Sharing Scheme
    PANG Liao-jun
    Wuhan University Journal of Natural Sciences, 2005, (01) : 191 - 194
  • [7] An efficient (t, n) multi-secret sharing scheme with verification
    Pang, L. J.
    Li, H. X.
    Jiao, L. C.
    Wang, Y. M.
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 552 - 557
  • [8] A new (t, n)-threshold multi-secret sharing scheme
    Li, HX
    Cheng, CT
    Pang, LJ
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 421 - 426
  • [9] A Distributed Multi-secret Sharing Scheme on the (t,n) Threshold
    Chen, Guiqiang
    Wang, Huanwen
    Wang, Liqin
    Jin, Yue
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 358 - +
  • [10] An efficient (t, n)-threshold multi-secret sharing scheme
    Shi Runhua
    Huang Liusheng
    Zhong Hong
    FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 580 - +