TY - JOUR
T1 - Attacks to some verifiable multi-secret sharing schemes and two improved schemes
AU - Liu, Yanhong
AU - Zhang, Futai
AU - Zhang, Jie
N1 - Publisher Copyright:
© 2015 Published by Elsevier B.V.
PY - 2016/2/1
Y1 - 2016/2/1
N2 - Secret sharing plays an important role in protecting confidential information from being lost, destroyed, or falling into wrong hands. Verifiable multi-secret sharing enables a dealer to share multiple secrets among a group of participants such that the deceptive behaviors of the dealer and the participants can be detected. In this paper, we analyze the security of several recently proposed verifiable multi-secret sharing schemes. We show that these schemes cannot withstand some deceptive behaviors of the dealer, and hence fails to satisfy the basic requirement of secure verifiable secret sharing schemes. After that, we present two improved verifiable multi-secret sharing schemes. Our new schemes can not only resist cheating by the dealer or participants, but also remove the use of private channels.
AB - Secret sharing plays an important role in protecting confidential information from being lost, destroyed, or falling into wrong hands. Verifiable multi-secret sharing enables a dealer to share multiple secrets among a group of participants such that the deceptive behaviors of the dealer and the participants can be detected. In this paper, we analyze the security of several recently proposed verifiable multi-secret sharing schemes. We show that these schemes cannot withstand some deceptive behaviors of the dealer, and hence fails to satisfy the basic requirement of secure verifiable secret sharing schemes. After that, we present two improved verifiable multi-secret sharing schemes. Our new schemes can not only resist cheating by the dealer or participants, but also remove the use of private channels.
KW - Private channel
KW - RSA cryptosystem
KW - Secret sharing
KW - Shadow
KW - Verifiable multi-secret sharing scheme
UR - http://www.scopus.com/inward/record.url?scp=84949667469&partnerID=8YFLogxK
U2 - 10.1016/j.ins.2015.09.040
DO - 10.1016/j.ins.2015.09.040
M3 - Article
AN - SCOPUS:84949667469
SN - 0020-0255
VL - 329
SP - 524
EP - 539
JO - Information Sciences
JF - Information Sciences
ER -