(t,n) multi-secret sharing scheme extended from Harn-Hsu’s scheme

被引:0
|
作者
Tong Zhang
Xizheng Ke
Yanxiao Liu
机构
[1] Xi’an University of Technology,Department of Computer Science and Engineering
关键词
Secret sharing scheme; Multiple secrets; Asynchronous; Bivariate polynomial;
D O I
暂无
中图分类号
学科分类号
摘要
Multi-secret sharing scheme has been well studied in recent years. In most multi-secret sharing schemes, all secrets must be recovered synchronously; the shares cannot be reused any more. In 2017, Harn and Hsu proposed a novel and reasonable feature in multiple secret sharing, such that the multiple secrets should be reconstructed asynchronously and the recovering of previous secrets do not leak any information on unrecovered secrets. Harn and Hsu also proposed a (t,n) multi-secret sharing scheme that satisfies this feature. However, the analysis on Harn-Hsu’s scheme is wrong, and their scheme fails to satisfy this feature. If one secret is reconstructed, all the other unrecovered secrets can be computed by any t − 1 shareholders illegitimately. Another problem in Harn-Hsu’s work is that the parameters are unreasonable which will be shown as follows. In this paper, we prove the incorrectness of Harn-Hsu’s scheme and propose a new (t,n) multi-secret sharing scheme which is extended from Harn-Hsu’s scheme; our proposed scheme satisfies the feature introduced by Harn and Hsu.
引用
收藏
相关论文
共 50 条
  • [31] A non-interactive (t, n)-publicly verifiable multi-secret sharing scheme
    Mashahdi, Samaneh
    Bagherpour, Bagher
    Zaghian, Ali
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (08) : 1761 - 1782
  • [32] GOMSS: A Simple Group Oriented (t, m, n) Multi-secret Sharing Scheme
    Miao Fuyou
    Wang Li
    Ji Yangyang
    Xiong Yan
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (03) : 557 - 563
  • [33] A New Double Layer Multi-Secret Sharing Scheme
    Elavarasi Gunasekaran
    Vanitha Muthuraman
    China Communications, 2024, 21 (01) : 297 - 309
  • [34] Multi-Secret Image Sharing Scheme by Boolean Operations
    Chen, Chien-Chang
    Lin, Cheng-Shian
    Chen, Jia-Zhan
    2022 IEEE 18TH INTERNATIONAL COLLOQUIUM ON SIGNAL PROCESSING & APPLICATIONS (CSPA 2022), 2022, : 397 - 402
  • [35] Verifiable multi-secret sharing scheme based on S-multiplication
    He, MX
    Fan, PZ
    Kaderali, F
    WAVELET ANALYSIS AND ITS APPLICATIONS, AND ACTIVE MEDIA TECHNOLOGY, VOLS 1 AND 2, 2004, : 602 - 608
  • [36] Multi-secret sharing threshold visual cryptography scheme
    Yu, Bin
    Xu, Xiaohui
    Fang, Liguo
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 815 - +
  • [37] A generalized multi-secret sharing scheme to identify cheaters
    Huang, Zhi-Xiong
    Li, Qun-Hui
    Wei, Ren-Yong
    Li, Zhi-Yong
    Tiedao Xuebao/Journal of the China Railway Society, 2007, 29 (06): : 52 - 56
  • [38] A Modified Multi-secret Sharing Visual Cryptography Scheme
    Yu, Bin
    Fu, Zhengxin
    Fang, Liguo
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 912 - 915
  • [39] Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme
    Wang, Na
    Cai, Yuanyuan
    Fu, Junsong
    Chen, Xiqi
    IEEE ACCESS, 2020, 8 : 20799 - 20804
  • [40] An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme
    Chang, TY
    Hwang, MS
    Yang, WP
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 163 (01) : 169 - 178