New (k,l,m)-verifiable multi-secret sharing schemes based on XTR public key system

11/17/2020
by   Jing Yang, et al.
0

Secret sharing was proposed primarily in 1979 to solve the problem of key distribution. In recent decades, researchers have proposed many improvement schemes. Among all these schemes, the verifiable multi-secret sharing (VMSS) schemes are studied sufficiently, which share multiple secrets simultaneously and perceive malicious dealer as well as participants. By pointing out that the schemes presented by Dehkordi and Mashhadi in 2008 cannot detect some vicious behaviors of the dealer, we propose two new VMSS schemes by adding validity check in the verification phase to overcome this drawback. Our new schemes are based on XTR public key system, and can realize GF(p^6) security by computations in GF(p^2) without explicit constructions of GF(p^6), where p is a prime. Compared with the VMSS schemes using RSA and linear feedback shift register (LFSR) public key cryptosystems, our schemes can achieve the same security level with shorter parameters by using trace function. What's more, our schemes are much simpler to operate than those schemes based on Elliptic Curve Cryptography (ECC). In addition, our schemes are dynamic and threshold changeable, which means that it is efficient to implement our schemes according to the actual situation when participants, secrets or the threshold needs to be changed.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/11/2019

New dynamic and verifiable multi-secret sharing schemes based on LFSR public key cryptosystem

A verifiable multi-secret sharing (VMSS) scheme enables the dealer to sh...
research
01/11/2018

Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver

The secret sharing schemes are the important tools in cryptography that ...
research
09/02/2023

Manifesting Unobtainable Secrets: Threshold Elliptic Curve Key Generation using Nested Shamir Secret Sharing

We present a mechanism to manifest unobtainable secrets using a nested S...
research
02/18/2022

Post-quantum Multi-stage Secret Sharing Schemes using Inhomogeneous Linear Recursion and Ajtai's Function

Secret sharing was firstly proposed in 1979 by Shamir and Blakley respec...
research
03/09/2020

A Verifiable Quantum Secret Sharing Scheme Based on a Single Qubit

To detect frauds from some internal participants or external attackers, ...
research
01/20/2021

The (in)security of some recently proposed lightweight key distribution schemes

Two recently published papers propose some very simple key distribution ...
research
04/24/2020

Optimal Threshold Padlock Systems

In 1968, Liu described the problem of securing the documents in a shared...

Please sign up or login with your details

Forgot password? Click here to reset