可验证秘密共享
秘密分享
安全多方计算
正确性
计算机科学
同态秘密共享
计算机安全
方案(数学)
沙米尔的秘密分享
安全性分析
密码学
理论计算机科学
算法
集合(抽象数据类型)
数学
数学分析
程序设计语言
作者
Takumi Makino,Yoko Kamidoi,Shin’ichi Wakabayashi
标识
DOI:10.1109/compsac48688.2020.0-158
摘要
On information security area, it is important to guarantee data privacy, availability and integrity. Secret sharing schemes are known as technologies for protecting data privacy and attaining availability. In secret sharing schemes, n distributed informations of a secret value d, called as shares are constructed, and distributed those to n participants. Then, a group of t members for n participants reconstruct the secret value d by exchanging their shares each other. On the other hand, less than t shares cannot induce the secret value. Moreover, as secret sharing schemes for solving the issue for data integrity, there exist verifiable secret sharing schemes. In verifiable secret sharing schemes, we can also confirm the correctness of reconstructed secrets. In this paper, we focus on a previous verifiable secret sharing scheme and point out issues as necessity of multi-party computations to protect shares from malicious participants. Next, we propose a new verifiable secret sharing scheme without multi-party computations and prove the security of verifications by the proposed scheme.
科研通智能强力驱动
Strongly Powered by AbleSci AI