Publication:
Cheating detection and cheater identification in (t, n) secret sharing scheme

Loading...
Thumbnail Image

Date

2014

Journal Title

Journal ISSN

Volume Title

Publisher

C R L Publishing Ltd

Research Projects

Organizational Units

Journal Issue

Abstract

Secret sharing technology is being again on the agenda when the security of big data and cloud computing is becoming a thorny problem. In a (t, n) secret sharing scheme, a secret data is distributed by a mutually trusted dealer to n shareholders by this means that the secret could not be obtained and reconstructed by less than t shareholders unless the number is no less than t. However, dishonest shareholders can fool other honest shareholders by presenting fake shares in the secret reconstruction phase. Therefore, cheating detection and cheater identification are very important to achieving fair secret reconstruction. In this paper, we propose a (t, n) detecting and identifying secret sharing scheme (DISS) based on the symmetric bivariate polynomial. In our (t, n) DISS, we use the property of symmetry to detect cheating, and use voting to identify cheaters. Furthermore, detection and identification abilities, and the thresholds in voting are discussed under three types of attack.

Description

Keywords

Citation

Collections

Endorsement

Review

Supplemented By

Referenced By