Browse > Article
http://dx.doi.org/10.13089/JKIISC.2014.24.6.1037

A Verifiable Secret Sharing Scheme with no Secure Channels  

Kim, Ho-Hee (Kyungpook National University)
Abstract
A (t,n) threshold secret sharing scheme is the scheme which allows a trusted party to distribute the shares among n participants in such a way that any t of them can recover the original secret, but any group knowing only t-1 or fewer shares can not. Recently, Eslami et al. and Tadayon et al. proposed threshold multi-secret sharing schemes, respectively. They proposed that their schemes don't require secure channels. But, without secure channels in their schemes, everyone can get the shares and find the secrets. The proposed scheme does not use secure channels and only t participants can solve the equations of the system from the delivered share shadows and find the secrets.
Keywords
Verifiable multi-secret sharing; Bilinear Maps;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Shamir, "How to share a secret," Communication of the ACM, vol. 22, no.11, pp. 612-613, Nov. 1979.   DOI   ScienceOn
2 G. Blakley, "Safeguarding crypto- graphic keys," AFIPS Conference Proceedings, 48, pp. 313-317, 1979.
3 B. Chor and S. Goldwasser, "Verifiable Secret Sharing and achieving simultaneity in the presence of faults," Proc. of 26th IEEE Symposium. FOCS, pp. 383-395, Oct. 1985.
4 J. He and E. Dawson, "Multistage secret sharing based on one-way function," Electronics Letters, vol.31, no. 19, pp. 1591-1592, Sep. 1994.
5 R. Shi, H. Zhong and L. Huang, "A (t,n)-Threshold Verified Multi-secret Sharing Scheme based on ECDLP," 8th ACIS International Conference, vol. 2, pp. 9-13, July 2007.
6 W. Chen, L. Xiang, B. Yuebin and G. Xiaopeng, "A New Dynamic threshold Secret sharing Scheme from bilinear Maps," International Conference on Parallel Processing Workshops, pp. 19-22, Sep. 2007.
7 S. J. Wang, Y. R. Tsai, and J. J. Shen, "Verifiable threshold scheme in multi-secret sharing distributions upon extensions of ecc," Wireless Personal Communications, Springer, vol. 56, no.1, pp. 173-182, Jan. 2011.   DOI
8 Z. Eslami and K. Rad, "A New Verifiable Multi-secret sharing Scheme Based on Bilinear Maps," Wireless Personal Communications, Springer, vol. 63, no. 2, pp. 459-467, March 2012.   DOI
9 M. H. Tadayon, H. Khanmohammadi, and S. Arabi, "An attack on a dynamic multi-secret sharing scheme and enhancing its security," Electrical Engineering (ICEE), 21st Iranian Conference, pp. 1-5, May 2013.
10 X. Dong and Y. Zhang, "A Multi-secret sharing scheme based on general linear groups," 3rd International Conference on Information Science and Technology, pp. 480-483, March 2013.
11 D. R. Stinson, Cryptography Theory And Practice, CRC press, 2006.