Advanced Search
Volume 21 Issue 4
Jul.  1999
Turn off MathJax
Article Contents
Zhang Jianzhong, Xiao Guozhen. A THRESHOLD SECRET SHARING SCHEME TO IDENTIFY CHEATERS[J]. Journal of Electronics & Information Technology, 1999, 21(4): 516-521.
Citation: Zhang Jianzhong, Xiao Guozhen. A THRESHOLD SECRET SHARING SCHEME TO IDENTIFY CHEATERS[J]. Journal of Electronics & Information Technology, 1999, 21(4): 516-521.

A THRESHOLD SECRET SHARING SCHEME TO IDENTIFY CHEATERS

  • Received Date: 1998-02-18
  • Rev Recd Date: 1998-10-23
  • Publish Date: 1999-07-19
  • In this paper a threshold secret sharing scheme to identify cheaters is proposed by using authentication codes.The performance of the scheme is discussed. The results show that in the scheme the valid shareholders not only can identify the impersonation of an adversary, but also are able to detect the cheating of some valid shareholders, in particular one honest shareholder is able to detect the cheating of the other participants forming a coalition, and the information rate of the scheme is higher than that of others.
  • loading
  • Blakley G R. Safeguarding cryptographic keys. Proc. AFIPS 1979, National Computer Confer-[2]ence, 1979, Vo1.48, 313-317.[3]Shamir A. How to share a secret[J].Communications of the ACM.1979, 22(11):612-613[4]Denning D. Cryptography and Data Security. Reading, MA: Addison-Wesley, 1983, 135-185.[5]Simmons G J. An introduction to shared secret and/or shared control schemes and their appli-[6]cation. in Contemporary Cryptology: The Science of Information Integrity, G. J. Simmons(Ed.), New York: IEEE Press, 1992, 441-497.[7]王育民,何大可.保密学--基础与应用.西安:西安电子科技大学出版社,1990, 246-342.[8]Carpentieri M, Santis A D, Vaccaro U. Size of shares and probability of cheating in threshold schemes. Advances in Cryptology-EUROCRYPT93 (T. Helleseth,ed.), Lecture Notes in Com-[9]puter Science vol.765, Springer-Verlag, New York: 1994, 118-125.[10]Karnin E D, Greene J W, Hellman M E. On secret sharing systems. IEEE Trans. on IT, 1983, IT-29(l): 35-41.[11]Stinson D R. Decomposition constructions for secret sharing schemes. IEEE Trans. on IT, 1994, IT-40(1): 118-125.[12]Blundo C, Gressti A, Santis A D, Vaccaro U. Fully dynamic secret sharing schemes. Proc.[J]. Crypto9.1994,LNCS vo1.773:110-[13]王新梅. 级连码(K, N)门限通信密钥分散保管系统.通信学报,1987, 8(1): 1-9.[14]郑宝东.关于(K, N)门通信密钥分散保管系统的讨论.通信学报,1994, 15(1): 23-28.[15]J McEliece R J, Sarwate D V. On sharing secrets and Reed-Solomon codes[J].Communication of the ACM.1981, 24(8):583-584
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1900) PDF downloads(414) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return