Verifiable Rational Multi-secret Sharing Scheme

  • Conference paper
Information Computing and Applications (ICICA 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 244))

Included in the following conference series:

  • 1604 Accesses

Abstract

In this paper we mainly focus on the cheating problem and the incapability problem existed in rational secret sharing schemes. Based on current schemes and the related knowledge of bit commitment agreement, we proposed a verifiable rational multi-secret sharing scheme in which players can verify the identity of the dealer. In this way, it is feasible to prevent the forger from cheating. The correctness of the secret share is also guaranteed by discrete logarithm problem. The secret shares are divided into groups so that the distribution phase is well designed. The game theory model is also adopted to realize the rational multi secret sharing. The efficient of our scheme has remarkably improved in this protocol as well as the security and feasibility.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Diffie, W., Hellman, M.: New Directions in Cryptography. J. IEEE Transaction on Information Theory 22(6), 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  2. Shamir, A.: How to share a secret. J. Communications of the ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  3. Blakely, G.R.: Safeguarding Cryptographic Keys. In: Proc. AFIPS 1979 National Computer Conference, New York, NY, pp. 313–317 (1979)

    Google Scholar 

  4. Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: Verifiable secret sharing and achieving simultaneity in the presence of faults. In: Proceedings of the 26th IEEE Symposium on the Foundations of Computer Science, pp. 383–395 (1985)

    Google Scholar 

  5. Stadler, M.: Publicly Verifiable Secret Sharing. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 190–199. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  6. Schoenmakers, B.: A Simple Publicly Verifiable Secret Sharing Scheme and its Application to Electronic Voting. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 148–164. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  7. LiaoJun, P., QingQi, P., LiCheng, J., Yu-Min, W.: An Identity (ID)-Based Threshold Multi-Secret Sharing Scheme. Journal of Software 19(10), 2739–2745 (2008)

    Article  MATH  Google Scholar 

  8. Dawson, H.J., Dawson, E.: Multisecret-sharing Scheme Based on One-way Function. J. Electronic Letters 31(2), 93–95 (1995)

    Article  Google Scholar 

  9. Harn, L.: Efficient sharing (broadcasting) of multiple secrets. J. IEE Proc. Comput. Digit. Tech. 142(3), 237–240 (1995)

    Article  Google Scholar 

  10. Halpern, J., Teague, V.: Rational Secret Sharing and Multiparty Computation. In: Proceedings of the 36th Annual ACM Symposium on Theory of Computing (STOC), pp. 623–632 (2004)

    Google Scholar 

  11. Abraham, I., Dolev, D., Gonen, R.: Distributed computing meets game theory. Robust mechanisms for rational secret sharing and multiparty computation. In: Proc. of 25th ACM PODC, pp. 53–62. ACM Press, Denver (2006)

    Google Scholar 

  12. Gordon, S.D., Katz, J.: Rational Secret Sharing. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 229–241. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Maleka, S., Shareef, A., Pandu, R.C.: Rational Secret Sharing with Repeated Games. J. Information Security Practice and Experience, 334–346 (2008)

    Google Scholar 

  14. Kol, G., Naor, M.: Cryptography and Game Theory: Designing Protocols for Exchanging Information. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 320–339. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  15. Zhang, E., Cai, Y.Q.: A New Rational Secret Sharing Scheme. J. China Communications 7(4), 18–22 (2010)

    Google Scholar 

  16. Li, D.-w., Yang, G., Yu, C.-g.: A Survey of Rational Secret Sharing schemes. Journal of Nan**g University of Posts and Telecommunications (Natural Science) 30(2), 89–94 (2010)

    MathSciNet  Google Scholar 

  17. Shareef, A.: Brief Announcement: Collusion Free Protocol for Rational Secret Sharing. In: 29th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, Zurich, Switzerland, July 25-28, pp. 402–403 (2010)

    Google Scholar 

  18. Halevi, S., Micali, S.: Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 22–24. Springer, Heidelberg (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cai, Y., Luo, Z., Yang, Y. (2011). Verifiable Rational Multi-secret Sharing Scheme. In: Liu, C., Chang, J., Yang, A. (eds) Information Computing and Applications. ICICA 2011. Communications in Computer and Information Science, vol 244. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27452-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27452-7_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27451-0

  • Online ISBN: 978-3-642-27452-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation