Efficient (k, n) threshold secret sharing schemes secure against cheating from n - 1 cheaters

28Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In (k, n) threshold secret sharing scheme, Tompa and Woll consider a problem of cheaters who try to make another participant reconstruct invalid secret. Later, the model of such cheating is formalized in some researches. Some schemes secure against cheating of these models are proposed. However, in these models, the number of colluding participants is restricted to k - 1 or less. In this paper, we consider k or more colluding participants. Of course, secrecy is not maintained to such participants. However, if considering detecting the fact of cheating, we need to consider a cheating from k or more colluding participants. In this paper, we propose a (k, n) threshold secret sharing scheme that is capable of detecting the fact of cheating from n -1 or less colluding participants. A scheme proposed by Tompa and Woll can be proven to be a (k, n) threshold secret sharing scheme that is capable of detecting the fact of cheating from n - 1 or less colluding participants. However, our proposed scheme is much more efficient with respect to the size of shares. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Araki, T. (2007). Efficient (k, n) threshold secret sharing schemes secure against cheating from n - 1 cheaters. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4586 LNCS, pp. 133–142). Springer Verlag. https://doi.org/10.1007/978-3-540-73458-1_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free