Skip to main content
Log in

Detection of Cheaters in Vector Space Secret Sharing Schemes

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

A perfect secret sharing scheme is a method of distributing shares of a secret among a set P of participants in such a way that only qualified subsets of P can reconstruct the secret from their shares and non-qualified subsets have absolutely no information on the value of the secret. In a secret sharing scheme, some participants could lie about the value of their shares in order to obtain some illicit benefit. Therefore, the security against cheating is an important issue in the implementation of secret sharing schemes. Two new secret sharing schemes in which cheaters are detected with high probability are presented in this paper. The first one has information rate equal to 1/2 and can be implemented not only in threshold structures, but in a more general family of access structures. We prove that the information rate of this scheme is almost optimal among all schemes with the same security requirements. The second scheme we propose is a threshold scheme in which cheaters are detected with high probability even if they know the secret. The information rate is in this case 1/3 In both schemes, the probability of cheating successfully is a fixed value that is determined by the size of the secret.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. M. Ben-Or and T. Rabin, Verifiable secret sharing and multiparty protocols with honest majority, Proc. 21st ACM Symposium on Theory of Computing, (1989) pp. 73-85.

  2. G.R. Blakley, Safeguarding cryptographic keys, AFIPS Conference Proceedings, Vol. 48 (1979) pp. 313-317.

    Google Scholar 

  3. C. Blundo, A. De Santis, L. Gargano and U. Vaccaro, On the Information Rate of Secret Sharing Schemes, Advances in Cryptology CRYPTO'92 (E.F. Brickell, ed.) Lecture Notes in Computer Science, Springer-Verlag, Berlin, Vol. 740 (1993) pp. 148-167.

    Google Scholar 

  4. C. Blundo, A. De Santis, D.R. Stinson and U. Vaccaro, Graph Decompositions and Secret Sharing Schemes, J. Cryptology, Vol. 8 (1995) pp. 39-64.

    Google Scholar 

  5. E.F. Brickell, Some ideal secret sharing schemes, J. Combin. Math. and Combin. Comput., Vol. 9 (1989) pp. 105-113.

    Google Scholar 

  6. E. F. Brickell and D. M. Davenport, On the Classification of Ideal Secret Sharing Schemes, J. Cryptology, Vol. 4 (1991) pp. 123-134.

    Google Scholar 

  7. E.F. Brickell and D.R. Stinson, The detection of cheaters in threshold schemes, SIAM J. Disc. Math., Vol. 4 (1991) pp. 502-510.

    Google Scholar 

  8. R. M. Capocelli, A. De Santis, L. Gargano and U. Vaccaro, On the Size of Shares of Secret Sharing Schemes, J. Cryptology, Vol. 6 (1993) pp. 157-168.

    Google Scholar 

  9. M. Carpentieri, A perfect threshold secret sharing scheme to identify cheaters, Designs, Codes and Cryptography, Vol. 5 (1995) pp. 183-187.

    Google Scholar 

  10. M. Carpentieri, A. De Santis and U. Vaccaro, Size of shares and probability of cheating in threshold schemes, Advances in Cryptology, EUROCRYPT'93 (T. Helleseth, ed.) Lecture Notes in Computer Science, Springer-Verlag, Berlin, Vol. 765 (1994) pp. 118-125.

    Google Scholar 

  11. W.A. Jackson and K.M. Martin, Geometric Secret Sharing Schemes and Their Duals, Designs, Codes and Cryptography, Vol. 4 (1994) pp. 83-95.

    Google Scholar 

  12. E.D. Karnin, J.W. Greene and M.E. Hellman, On secret sharing systems, IEEE Transactions on Information Theory, Vol. 29 (1983) pp. 35-41.

    Google Scholar 

  13. W. Ogata and K. Kurosawa, Optimum Secret Sharing Scheme Secure against Cheating, Advances in Cryptology, EUROCRYPT'96(U. Maurer, ed.), Lecture Notes in Computer Science, Springer-Verlag, Berlin, Vol. 1070 (1996) pp. 200-211.

    Google Scholar 

  14. J. Rifà-Coma, How to avoid cheaters succeeding in the key sharing scheme, Designs, Codes and Cryptography, Vol. 3 (1993) pp. 221-228.

    Google Scholar 

  15. A. Shamir, How to share a secret, Commun. of the ACM, Vol. 22 (1979) pp. 612-613.

    Google Scholar 

  16. G.J. Simmons, How to (really) share a secret, Advances in Cryptology-CRYPTO'88 (S. Goldwasser, ed.), Lecture Notes in Computer Science, Springer-Verlag, Berlin, Vol. 403 (1989) pp. 390-448.

    Google Scholar 

  17. G.J. Simmons, An introduction to shared secret and/or shared control schemes and their applications, Contemporary Cryptology: The Science of Information Integrity (G.J. Simmons, ed.), Piscataway, N.J., IEEE Press, (1992) pp. 441-497.

    Google Scholar 

  18. D.R. Stinson, An explication of secret sharing schemes, Designs, Codes and Cryptography, Vol. 2 (1992) pp. 357-390.

    Google Scholar 

  19. M. Tompa and H. Woll, How to share a secret with cheaters, J. Cryptology, Vol. 1 (1988) pp. 133-139.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Padro, C., Sáez, G. & Villar, J.L. Detection of Cheaters in Vector Space Secret Sharing Schemes. Designs, Codes and Cryptography 16, 75–85 (1999). https://doi.org/10.1023/A:1008378426278

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1008378426278

Navigation