Skip to main content
Top
Published in: Wireless Personal Communications 3/2015

01-06-2015

A New Verifiable Multi-secret Sharing Scheme Realizing Adversary Structure

Authors: Masoud Hadian Dehkordi, Yousof Farzaneh

Published in: Wireless Personal Communications | Issue 3/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In some practical applications of secret sharing schemes, such as Byzantine Quorum systems and secure multi-party protocols, the adversary can corrupt subsets of participants at the same time and exploits their shares to recover the secret. In these applications, the system can be described directly by corruptible subsets of participants (so-called adversary structure). A secret sharing scheme realizing adversary structure is a tool for these applications. It is a method of sharing a secret among a finite set of participants in such a way that only certain pre-specified subsets of participants cannot recover the secret. In this paper, we propose a verifiable multi-secret sharing scheme based on one-way hash function that realizes adversary structure, in which each participant has only one reusable shadow. In this scheme, the participant set and the adversary structure can be changed without refreshing any participant’s secret shadow and new secrets can be shared. The security of the proposed scheme is based on the properties of the one-way hash function. Our scheme has the advantages of better verifiability and fewer shadows preserves by every participant respect to other schemes realizing adversary structures.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Benaloh, J., & Leichter, J. (1989). Generalized secret sharing and monotone functions. Proceedings of advances in cryptology-CRYPTO’88, LNCS (Vol. 403, p. 213222). Heidelberg: Springer. Benaloh, J., & Leichter, J. (1989). Generalized secret sharing and monotone functions. Proceedings of advances in cryptology-CRYPTO’88, LNCS (Vol. 403, p. 213222). Heidelberg: Springer.
2.
go back to reference Blakley, G. R. (1979). Safeguarding cryptography keys. In Proceedings of the AFIPS 1979 National Computer Conference (pp. 313317). Blakley, G. R. (1979). Safeguarding cryptography keys. In Proceedings of the AFIPS 1979 National Computer Conference (pp. 313317).
3.
go back to reference Chor, B., Goldwasser, S., Micali, S., & Awerbuch, B. (1985). Verifiable secret sharing and achieving simultaneity in the presence of faults. In Proceedings of the 26th IEEE Symposium on Foundations of Computer Science (pp. 251–260). Chor, B., Goldwasser, S., Micali, S., & Awerbuch, B. (1985). Verifiable secret sharing and achieving simultaneity in the presence of faults. In Proceedings of the 26th IEEE Symposium on Foundations of Computer Science (pp. 251–260).
4.
go back to reference Das, A., & Adhikari, A. (2010). An efficient multi-use multi-secret sharing scheme based on hash function. Applied Mathematics Letters, 23, 993–996.CrossRefMATHMathSciNet Das, A., & Adhikari, A. (2010). An efficient multi-use multi-secret sharing scheme based on hash function. Applied Mathematics Letters, 23, 993–996.CrossRefMATHMathSciNet
5.
go back to reference Feldman, P. (1987). A practical scheme for non-interactive verifiable secret sharing. In Proceedings of the 28th IEEE Symposium on Foundations of Computer Science (pp. 427–437). IEEE. Feldman, P. (1987). A practical scheme for non-interactive verifiable secret sharing. In Proceedings of the 28th IEEE Symposium on Foundations of Computer Science (pp. 427–437). IEEE.
6.
go back to reference Guo, Y. B., & Ma, J. F. (2004). Practical secret sharing scheme realizing generalized adversary structure. Journal of Computer Science and Technology, 19(4), 564–569.CrossRefMathSciNet Guo, Y. B., & Ma, J. F. (2004). Practical secret sharing scheme realizing generalized adversary structure. Journal of Computer Science and Technology, 19(4), 564–569.CrossRefMathSciNet
7.
go back to reference Harn, L. (1995). Efficient sharing (broadcasting) of multiple secret. In IEE Proceedings of Computers and Digital Techniques (Vol. 142, No. 3, pp. 237–240). Harn, L. (1995). Efficient sharing (broadcasting) of multiple secret. In IEE Proceedings of Computers and Digital Techniques (Vol. 142, No. 3, pp. 237–240).
8.
go back to reference He, J., & Dawson, E. (1994). Multistage secret sharing based on one-way function. Electronics Letters, 30(19), 1591–1592.CrossRef He, J., & Dawson, E. (1994). Multistage secret sharing based on one-way function. Electronics Letters, 30(19), 1591–1592.CrossRef
9.
go back to reference He, J., & Dawson, E. (1995). Multi secret-sharing scheme based on one-way function. Electronics Letters, 31(2), 93–95.CrossRef He, J., & Dawson, E. (1995). Multi secret-sharing scheme based on one-way function. Electronics Letters, 31(2), 93–95.CrossRef
10.
go back to reference Hirt, M., & Maurer, U. (2000). Player simulation and general adversary structures in perfect multiparty computation. Journal of Cryptology, 13(1), 31–60.CrossRefMATHMathSciNet Hirt, M., & Maurer, U. (2000). Player simulation and general adversary structures in perfect multiparty computation. Journal of Cryptology, 13(1), 31–60.CrossRefMATHMathSciNet
11.
go back to reference Ito, M., Saito, A., & Nishizeki, T. (1987). Secret sharing schemes realizing general access structure. In Proceedings of IEEE Global Telecommunication Conferencepp (pp. 99–102). New Jersey: IEEE. Ito, M., Saito, A., & Nishizeki, T. (1987). Secret sharing schemes realizing general access structure. In Proceedings of IEEE Global Telecommunication Conferencepp (pp. 99–102). New Jersey: IEEE.
12.
go back to reference Jackson, W. A., Martin, K. M., & O-Keefe, C. M. (1994). On sharing many secrets. In advances in cryptology asiacrypt’94, LNCS 917 (pp. 42–54). Heidelberg: Springer. Jackson, W. A., Martin, K. M., & O-Keefe, C. M. (1994). On sharing many secrets. In advances in cryptology asiacrypt’94, LNCS 917 (pp. 42–54). Heidelberg: Springer.
13.
go back to reference Malkhi, D., & Reiter, M. K. (1998). Byzantine quorum systems. Distributed Computing, 11(4), 203–213.CrossRef Malkhi, D., & Reiter, M. K. (1998). Byzantine quorum systems. Distributed Computing, 11(4), 203–213.CrossRef
14.
go back to reference Qin, H., Dai, Y., & Wang, Z. (2009). A secret sharing scheme based on \((t, n)\) threshold and adversary structure. International Journal of Information Security, 8, 379–385.CrossRef Qin, H., Dai, Y., & Wang, Z. (2009). A secret sharing scheme based on \((t, n)\) threshold and adversary structure. International Journal of Information Security, 8, 379–385.CrossRef
16.
go back to reference Sun, H. M., & Shieh, S. P. (1996). An efficient construction of perfect secret sharing schemes for graph-based structures. Computers and Mathematics with Applications, 31(7), 129–135.CrossRefMATHMathSciNet Sun, H. M., & Shieh, S. P. (1996). An efficient construction of perfect secret sharing schemes for graph-based structures. Computers and Mathematics with Applications, 31(7), 129–135.CrossRefMATHMathSciNet
17.
go back to reference Sun, H. M., & Shieh, S. P. (1998). Secret sharing schemes for graph-based prohibited structures. Computers and Mathematics with Applications, 36(7), 131–140.CrossRefMATHMathSciNet Sun, H. M., & Shieh, S. P. (1998). Secret sharing schemes for graph-based prohibited structures. Computers and Mathematics with Applications, 36(7), 131–140.CrossRefMATHMathSciNet
18.
go back to reference Van Dijk, M., Jackson, W.-A., & Martin, K. M. (1998). A general decomposition construction for incomplete secret sharing schemes. Designs, Codes and Cryptography, 15, 301–321.CrossRefMATH Van Dijk, M., Jackson, W.-A., & Martin, K. M. (1998). A general decomposition construction for incomplete secret sharing schemes. Designs, Codes and Cryptography, 15, 301–321.CrossRefMATH
Metadata
Title
A New Verifiable Multi-secret Sharing Scheme Realizing Adversary Structure
Authors
Masoud Hadian Dehkordi
Yousof Farzaneh
Publication date
01-06-2015
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2015
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2310-9

Other articles of this Issue 3/2015

Wireless Personal Communications 3/2015 Go to the issue