Abstract
In this paper, we propose a framework of cheating-detectable threshold schemes against the most powerful cheaters. Our scheme is used to distribute long secrets, and the share size is almost optimum. If the threshold is 2, our scheme is more efficient than the existing schemes even in the weaker adversarial model.
Similar content being viewed by others
References
Araki T.: Efficient (k, n) threshold secret sharing schemes secure against cheating from n−1 cheaters. Proceedings of ACISP ’07. Lecture Notes in Computer Science, vol. 4586, pp. 133–142 (2007).
Araki T., Obana S.: Flaws in some secret sharing schemes against cheating. Information Security and Privacy, Lecture Notes in Computer Science, vol. 4586, pp. 122–132 (2007).
Blakley G.R.: Safeguarding cryptographic keys. Proceedings of the AFIPS 1979 National Computer Conference, pp. 313–317. AFIPS Press, Monval, (1979).
Carpentieri M., De Santis A., Vaccaro U.: Size of shares and probability of cheating in threshold schemes. Advances in cryptography—eurocrypt ’93. Lecture Notes in Computer Science, vol. 765, pp. 118–125 (1994).
Obana S.: A generic construction of Secret sharing schemes secure against n-1 cheaters. Proceedings of 2008 Symposium on Cryptography and Information Security, CD-ROM, 4F1–6, (In Japanese), (2008).
Obana S., Araki T.: Almost optimum secret sharing schemes secure against cheating for arbitrary secret distribution. Proceedings of ASIACRYPT 2006, Lecture Notes in Computer Science, vol. 428, pp. 364–379 (2006).
Ogata W., Kurosawa K., Stinson D.R.: Optimum secret sharing scheme secure against cheating. SIAM J. Discrete Math. 20, 79–95 (2006)
Shamir A.: How to share a secret. Communications of the ACM, vol. 22, pp. 612–613 (1979).
Tompa M., Woll H.: How to share a secret with cheaters. J. Cryptol. 1, 133–138 (1988)
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by C. M. O'Keefe.
Rights and permissions
About this article
Cite this article
Ogata, W., Eguchi, H. Cheating detectable threshold scheme against most powerful cheaters for long secrets. Des. Codes Cryptogr. 71, 527–539 (2014). https://doi.org/10.1007/s10623-012-9756-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-012-9756-5