(t,n) multi-secret sharing scheme extended from Harn-Hsu’s scheme

被引:0
|
作者
Tong Zhang
Xizheng Ke
Yanxiao Liu
机构
[1] Xi’an University of Technology,Department of Computer Science and Engineering
关键词
Secret sharing scheme; Multiple secrets; Asynchronous; Bivariate polynomial;
D O I
暂无
中图分类号
学科分类号
摘要
Multi-secret sharing scheme has been well studied in recent years. In most multi-secret sharing schemes, all secrets must be recovered synchronously; the shares cannot be reused any more. In 2017, Harn and Hsu proposed a novel and reasonable feature in multiple secret sharing, such that the multiple secrets should be reconstructed asynchronously and the recovering of previous secrets do not leak any information on unrecovered secrets. Harn and Hsu also proposed a (t,n) multi-secret sharing scheme that satisfies this feature. However, the analysis on Harn-Hsu’s scheme is wrong, and their scheme fails to satisfy this feature. If one secret is reconstructed, all the other unrecovered secrets can be computed by any t − 1 shareholders illegitimately. Another problem in Harn-Hsu’s work is that the parameters are unreasonable which will be shown as follows. In this paper, we prove the incorrectness of Harn-Hsu’s scheme and propose a new (t,n) multi-secret sharing scheme which is extended from Harn-Hsu’s scheme; our proposed scheme satisfies the feature introduced by Harn and Hsu.
引用
收藏
相关论文
共 50 条
  • [41] A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme
    Shao, J
    Cao, ZF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 135 - 140
  • [42] Decentralized CRT-Based Efficient Verifiable (n, t, n) Multi-secret Sharing Scheme
    Wen, Wen
    Vaidya, Binod
    Makrakis, Dimitrios
    Adams, Carlisle
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 279 - 293
  • [43] A hierarchical weighted threshold multi-secret sharing scheme
    Chang, CC
    Pan, YP
    Proceedings of the Second International Conference on Information and Management Sciences, 2002, 2 : 333 - 340
  • [44] A new double layer multi-secret sharing scheme
    Gunasekaran, Elavarasi
    Muthuraman, Vanitha
    CHINA COMMUNICATIONS, 2024, 21 (01) : 287 - 309
  • [45] Multi-secret sharing scheme based on cellular automata
    Institute of Hydropower System and Hydroinformatics, Dalian Univ. of Tech, Dalian 116024, China
    不详
    不详
    Xitong Gongcheng Lilum yu Shijian, 2006, 6 (113-116):
  • [46] Design and Analysis of a New Multi-secret Sharing Scheme
    Liu Feng
    Gao Dong-Mei
    2009 ETP INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATION (FCC 2009), 2009, : 241 - 243
  • [47] AN IDEAL MULTI-SECRET SHARING SCHEME BASED ON MSP
    Hei, Zan
    Li, Zhi-Hui
    Wu, Xingxing
    QUANTITATIVE LOGIC AND SOFT COMPUTING, 2012, 5 : 246 - 251
  • [48] An ideal multi-secret sharing scheme based on MSP
    Hsu, Ching-Fang
    Cheng, Qi
    Tang, Xueming
    Zeng, Bing
    INFORMATION SCIENCES, 2011, 181 (07) : 1403 - 1409
  • [49] Multi-secret sharing scheme with general access structures
    Li, Hui-Xian
    Cheng, Chun-Tian
    Pang, Liao-Jun
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2006, 34 (06): : 95 - 98
  • [50] A new multi-secret sharing scheme with multi-policy
    Geng Yong-Jun
    Fan Xiao-Hong
    Hong Fan
    9th International Conference on Advanced Communication Technology: Toward Network Innovation Beyond Evolution, Vols 1-3, 2007, : 1515 - 1517