首页> 外文会议>International Conference on Security with Intelligent Computing and Big-data Services >A Secret Sharing Scheme of Dynamic Threshold with Cheaters Detection and Identification
【24h】

A Secret Sharing Scheme of Dynamic Threshold with Cheaters Detection and Identification

机译:骗子检测和识别动态阈值的秘密共享方案

获取原文

摘要

There are many schemes to detect and identify cheaters when the number of participants is exactly equal to t in secret sharing schemes. However, most of them need dealers or redundant information to detect the dishonest participants when participants are greater than threshold t. Harn et al. proposed a dynamic threshold secret reconstruction scheme, which the threshold can be improved to k during reconstruction. Less than k - 1 participants cannot recover the shared secret. Their scheme uses the symmetric polynomial to resist the external adversary. However, each participant needs to hold a polynomial. Thus, the complexity of storage of the scheme is high. Furthermore, the scheme cannot detect and identify the cheaters who present falsified information during secret reconstruction. In this paper, we propose a secret sharing scheme with dynamic threshold k that can identify up to k - 1 dishonest participants who have no legal share information. The scheme does not need the help of the dealer to detect cheaters. The dealer uses the traditional polynomial to distribute a secret to each participant. In the secret reconstruction phase, the share information of each participant is transformed and then presents to other participants who verify it using the public key of the sender. If the presented information is falsified, it will fail the verification and the related participant is identified as a cheater. Otherwise, the secret can be correctly reconstructed. Meanwhile, our scheme ensures that the external adversary who eavesdrops the reconstruction messages cannot recover the secret. The trade-off is that our scheme has additional computation overhead.
机译:当参与者的数量与秘密共享方案中完全等于T时,有许多方案可以检测和识别作弊者。但是,当参与者大于阈值T时,它们中的大多数都需要经销商或冗余信息来检测不诚实的参与者。 Harn等人。提出了一种动态阈值秘密重建方案,在重建期间阈值可以改善到k。小于K - 1参与者无法恢复共享秘密。它们的方案使用对称多项式来抵抗外部对手。但是,每个参与者都需要持有多项式。因此,该方案的存储复杂性高。此外,该计划无法检测和识别在秘密重建期间呈现伪造信息的骗子。在本文中,我们提出了一个具有动态阈值k的秘密共享方案,可以识别最多没有法律股票信息的K - 1名不诚实的参与者。该计划不需要经销商的帮助来检测骗子。经销商使用传统多项式来分发每个参与者的秘密。在秘密重建阶段,每个参与者的共享信息被转换,然后向其他参与者提供使用发件人的公钥验证它的参与者。如果所呈现的信息是伪造的,它将失败验证,相关参与者被识别为骗子。否则,可以正确重建秘密。同时,我们的计划确保了窃听重建消息的外部对手无法恢复秘密。权衡是我们的计划具有额外的计算开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号