2009
DOI: 10.1007/s10623-008-9265-8
|View full text |Cite
|
Sign up to set email alerts
|

Detection and identification of cheaters in (t, n) secret sharing scheme

Abstract: In a (t, n) secret sharing scheme, a secret s is divided into n shares and shared among a set of n shareholders by a mutually trusted dealer in such a way that any t or more than t shares will be able to reconstruct this secret; but fewer than t shares cannot know any information about the secret. When shareholders present their shares in the secret reconstruction phase, dishonest shareholder(s) (i.e. cheater(s)) can always exclusively derive the secret by presenting faked share(s) and thus the other honest sh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
71
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
8
1
1

Relationship

2
8

Authors

Journals

citations
Cited by 75 publications
(71 citation statements)
references
References 18 publications
0
71
0
Order By: Relevance
“…Now, we assume that j (n ≥ j ≥ t) number of participants are involved in a secret reconstruction out of n. Then, we have j −t legitimate shares in a secret reconstruction. When j − t > t (j ≥ t + 1), there are j−t t cases that will construct the legitimate secret [65]. This attack of not being able to reconstruct the secret succeeds only when j − t < t.…”
Section: Algorithm 1 Malicious Requests Detectionmentioning
confidence: 99%
“…Now, we assume that j (n ≥ j ≥ t) number of participants are involved in a secret reconstruction out of n. Then, we have j −t legitimate shares in a secret reconstruction. When j − t > t (j ≥ t + 1), there are j−t t cases that will construct the legitimate secret [65]. This attack of not being able to reconstruct the secret succeeds only when j − t < t.…”
Section: Algorithm 1 Malicious Requests Detectionmentioning
confidence: 99%
“…There are some schemes which support this feature. Harn and Lin [15] proposed cheater identification method for Shamir's scheme. Zhao et al [16] proposed new lossless secret sharing scheme to identify cheaters in image secret sharing.…”
Section: Cheater Identificationmentioning
confidence: 99%
“…Many works have focused on solving the cheating problem in secret sharing schemes. Some [10][11][12] were interested in detecting the cheating behavior, and some works [13][14][15] focused on not only detecting the cheating behavior, but also identifying the cheaters. The cheating identifiable schemes have stronger capability to resist cheating; it results that the shares are larger and the schemes are more complicated than those cheating detectable schemes.…”
Section: Introductionmentioning
confidence: 99%