Gan Yuan-ju, Xie Shi-yi, Zheng Xiao-ping, Fu Dong-yang . Improvement of Secure and Efficient (t,n) Multisecret Sharing Authenticating Scheme[J]. Journal of Electronics & Information Technology, 2007, 29(7): 1642-1644. doi: 10.3724/SP.J.1146.2005.01562
Citation:
Gan Yuan-ju, Xie Shi-yi, Zheng Xiao-ping, Fu Dong-yang . Improvement of Secure and Efficient (t,n) Multisecret Sharing Authenticating Scheme[J]. Journal of Electronics & Information Technology, 2007, 29(7): 1642-1644. doi: 10.3724/SP.J.1146.2005.01562
Gan Yuan-ju, Xie Shi-yi, Zheng Xiao-ping, Fu Dong-yang . Improvement of Secure and Efficient (t,n) Multisecret Sharing Authenticating Scheme[J]. Journal of Electronics & Information Technology, 2007, 29(7): 1642-1644. doi: 10.3724/SP.J.1146.2005.01562
Citation:
Gan Yuan-ju, Xie Shi-yi, Zheng Xiao-ping, Fu Dong-yang . Improvement of Secure and Efficient (t,n) Multisecret Sharing Authenticating Scheme[J]. Journal of Electronics & Information Technology, 2007, 29(7): 1642-1644. doi: 10.3724/SP.J.1146.2005.01562
Recently, Xie et al. proposed a multi-secret sharing authenticating scheme based on double secret shadow. In their scheme, the participant must use his two secret subshadows to prove his honesty in the secret reconstruction stage. This article, however, will demonstrate their scheme can not withstand the participant cheating. Finally, this article improves the Xie et al.s scheme to overcome the weakness and reduce the computation by using parallel algorithm in secret recovery phase.