A Verifiable Multi-Secret Sharing Scheme Based on Short Integer Solution
نویسندگان
چکیده
With the possible birth of quantum computer, traditional secret sharing schemes have been unable to meet security requirements. We proposed a new verifiable multi-secret scheme based on short integer solution problem. By utilizing symmetric binary polynomial, $k$ secrets and shares can be generated, then we convert into string xmlns:xlink="http://www.w3.org/1999/xlink">$\mathbb{Z}_{q}$ , which identified by one-way anti-collision hash function lattice, so that multiple reconstructed safely. The advantages mainly focus verifiability without interaction in distribution phase less memory requirement. In scheme, prevents dealer share wrong forces participants submit their correctly. Meanwhile, reduced, means is improved. releasing public values inevitable, this paper has size per reduce pressure consumption proper parameters. end, it also effectively resist attack.
منابع مشابه
Verifiable Secret Sharing Scheme Based on Integer Representation
In Shamir’s scheme that the security based on the numbers of the field of a prime number P which the coefficients' polynomial reduced to modulo P (takes a value from some field p Z , where P is a large prime number). Thus, the adversary must know only the free coefficient of the polynomial in order to break the scheme. Our scheme which based on representation integer using the so-called g a d i...
متن کاملA verifiable multi-secret sharing scheme based on cellular automata
In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme, based on one-dimensional cellular automata where the number of secrets is not restricted by n or t. We show that our scheme can be used to solve an open problem proposed recently in Alvarez et al. (2008) [G. Alvarez, L. Hernández Encinas, A. Martín del Rey, A multisecret sharing scheme for color images based on ...
متن کاملA practical verifiable multi-secret sharing scheme
C.-C. Yang, T.-Y. Chang, M.-S. Hwang [C.-C. Yang, T.-Y. Chang, M.-S. Hwang, A (t,n) multi-secret sharing scheme, Applied Mathematics and Computation 151 (2004) 483–490] proposed an efficient multi-secret sharing scheme based on a two-variable one-way function in 2004. But the scheme doesn't have the property of verification. A practical verifiable multi-secret sharing scheme, which is based on ...
متن کاملAn Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves
In a (t,n)-threshold secret sharing scheme, a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together, but no group of fewer than t participants can do. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao, and the intractability of the elliptic curve discrete logar...
متن کاملNovel verifiable multi-secret sharing scheme using bilinear pairing
Secret sharing schemes as basic building blocks for many applications in distributed systems should be efficient and robust to any possible attacks. Based on bilinear pairing, this paper will propose a new (t, n) threshold verifiable multi-secret sharing scheme and a GGOC verifiable multi-secret sharing scheme that improve the security and minimizes the number of published values.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Chinese Journal of Electronics
سال: 2023
ISSN: ['1022-4653', '2075-5597']
DOI: https://doi.org/10.23919/cje.2021.00.062