Cheating detectable secret sharing schemes supporting an arbitrary finite field

13Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we present k-out-of-n threshold secret sharing scheme which can detect share forgery by at most k-1 cheaters. Though, efficient schemes with such a property are presented so far, some schemes cannot be applied when a secret is an element of and some schemes require a secret to be an element of a multiplicative group. The schemes proposed in the paper possess such a merit that a secret can be an element of arbitrary finite field. Let |S| and ε be the size of secret and successful cheating probability of cheaters, respectively. Then the sizes of share |Vi| of two proposed schemes respectively satisfy |Vi| = (2· |S|)/ε |Vi| = (4· |S|)/ε) and which are only 2 and 3 bits longer than the existing lower bound. © 2014 Springer International Publishing.

Cite

CITATION STYLE

APA

Obana, S., & Tsuchida, K. (2014). Cheating detectable secret sharing schemes supporting an arbitrary finite field. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8639 LNCS, pp. 88–97). Springer Verlag. https://doi.org/10.1007/978-3-319-09843-2_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free