New (k,l,m)-verifiable multi-secret sharing schemes based on XTR public key system

نویسندگان

چکیده

Secret sharing was proposed primarily in 1979 to solve the problem of key distribution. In recent decades, researchers have many improvement schemes. Among all these schemes, verifiable multi-secret (VMSS) schemes are studied sufficiently, which share multiple secrets simultaneously and perceive malicious dealer as well participants. By pointing out that presented by Dehkordi Mashhadi 2008 cannot detect some vicious behaviors dealer, we propose two new VMSS adding validity check verification phase overcome this drawback. Our based on XTR public system, can realize GF(p6) security computations GF(p2) without explicit constructions GF(p6), where p is a prime. Compared with using RSA linear feedback shift register (LFSR) cryptosystems, achieve same level shorter parameters trace function. What's more, our much simpler operate than those Elliptic Curve Cryptography (ECC). addition, dynamic threshold changeable, means it efficient implement when participants, or needs be changed.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem

Article history: Received 29 November 2007 Received in revised form 6 May 2014 Accepted 22 August 2014 Available online 26 September 2014

متن کامل

New efficient and practical verifiable multi-secret sharing schemes

In 2006, Zhao et al. proposed a practical verifiable multi-secret sharing based on Yang et al.’s and Feldman’s schemes. In this paper we propose two efficient, computationally secure ðt; nÞ, and verifiable multi-secret sharing schemes based on homogeneous linear recursion. The first scheme has the advantage of better performance, a new simple construction and various techniques for the reconstr...

متن کامل

On Proactive Verifiable Secret Sharing Schemes

This paper investigates the security of Proactive Secret Sharing Schemes. We first consider the approach of using commitment to 0 in the renewal phase in order to refresh the player’s shares and we present two types of attacks in the information theoretic case. Then we prove the conditions for the security of such a proactive scheme. Proactivity can be added also using re-sharing instead of com...

متن کامل

Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures

A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. In 2005, Shao and Cao developed a verifiable multi-secret sharing scheme where each participant’s share can be used several times which reduces the number of interactions between the dealer and the group members. In addition, some secrets may require a higher security level than others involving t...

متن کامل

Verifiable Secret Redistribution for Threshold Sharing Schemes

We present a new protocol for the verifiable redistribution of secrets from (m,n) to (m,n) access structures for threshold sharing schemes. Our protocol enables the addition or removal of shareholders and also guards against mobile adversaries that cause permanent damage. We observe that existing protocols either cannot be readily extended to allow redistribution between different access struct...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Theoretical Computer Science

سال: 2022

ISSN: ['1879-2294', '0304-3975']

DOI: https://doi.org/10.1016/j.tcs.2022.01.036