Almost optimum t-cheater identifiable secret sharing schemes

36Citations
Citations of this article
32Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In Crypto'95, Kurosawa, Obana and Ogata proposed a k-out-of-n secret sharing scheme capable of identifying up to t cheaters with probability 1 - ε under the condition t ≤ ⌊(k - 1)/3⌋. The size of share |Vi| of the scheme satisfies |Vi| = |S|/ε t+2, which was the most efficient scheme known so far. In this paper, we propose new k-out-of-n secret sharing schemes capable of identifying cheaters. The proposed scheme possesses the same security parameters t,ε as those of Kurosawa et al.. The scheme is surprisingly simple and its size of share is |Vi| = |S|/ε, which is much smaller than that of Kurosawa et al. and is almost optimum with respect to the size of share; that is, the size of share is only one bit longer than the existing bound. Further, this is the first scheme which can identify cheaters, and whose size of share is independent of any of n,k and t. We also present schemes which can identify up to ⌊(k - 2)/2⌋, and ⌊(k - 1)/2⌋ cheaters whose sizes of share can be approximately written by and |Vi| ≈ (n·(t+1)·23t-1·|S|)/ε and |Vi| ≈ ((n·t·23t)2·|S|) /ε2, respectively. The number of cheaters that the latter two schemes can identify meet the theoretical upper bound. © 2011 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Obana, S. (2011). Almost optimum t-cheater identifiable secret sharing schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6632 LNCS, pp. 284–302). https://doi.org/10.1007/978-3-642-20465-4_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free