Efficient t-cheater identifiable (k, n) secret-sharing scheme for t ≤⌊((k - 2)/2)⌋

11Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

In Eurocrypt 2011, Obana proposed a (k, n) secret-sharing scheme that can identify up to ⌊((k - 2)/2)⌋ cheaters. The number of cheaters that this scheme can identify meets its upper bound. When the number of cheaters t satisfies t = ⌊((k - 1)/3)⌋, this scheme is extremely efficient since the size of share |Vi| can be written as |Vi| = |S|/., which almost meets its lower bound, where |S| denotes the size of secret and e denotes the successful cheating probability; when the number of cheaters t is close to . ((k - 2)/2)⌋, the size of share is upper bounded by |Vi| = (n•(t + 1) • 23t - 1|S|)/.σ A new (k, n) secret-sharing scheme capable of identifying ⌊((k - 2)/2)⌋ cheaters is presented in this study. Considering the general case that k shareholders are involved in secret reconstruction, the size of share of the proposed scheme is |Vi| = (2k - 1|S| )/σ, which is independent of the parameters t and n. On the other hand, the size of share in Obana's scheme can be rewritten as |Vi | = (n • (t + 1) • 2k - 1|S|)/σ under the same condition. With respect to the size of share, the proposed scheme is more efficient than previous one when the number of cheaters t is close to ⌊((k - 2)/2)⌋. © 2013 The Institution of Engineering and Technology.

Cite

CITATION STYLE

APA

Liu, Y. X. (2014). Efficient t-cheater identifiable (k, n) secret-sharing scheme for t ≤⌊((k - 2)/2)⌋. IET Information Security, 8(1), 37–41. https://doi.org/10.1049/iet-ifs.2012.0322

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free