2017
DOI: 10.1049/iet-ifs.2017.0111
|View full text |Cite
|
Sign up to set email alerts
|

Provably secure verifiable multi‐stage secret sharing scheme based on monotone span program

Abstract: In multi-secret sharing (MSS) scheme, a dealer distributes multiple secrets among a set of participants, each of them according to an access structure. In this study, the authors propose a novel linear MSS with computational verifiability that provide many functions for practical applications in comparison with the previous works focusing on MSS schemes in the general scenario. This scheme has the same advantages as previous schemes; moreover, it is verifiable and multi-use secret sharing. Furthermore, in this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 37 publications
0
4
0
Order By: Relevance
“…To share multiple secrets among participants, a dealer employs a multi‐secret sharing false(MSSfalse)$( {{\mathrm{MSS}}} )$ scheme [14–22]. MSS${\mathrm{MSS}}$ schemes can be categorized into two types based on secret reconstruction: multi‐stage secret sharing false(MSSSfalse)$( {{\mathrm{MSSS}}} )$ and general MSS false(GMSSfalse)$( {{\mathrm{GMSS}}} )$.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…To share multiple secrets among participants, a dealer employs a multi‐secret sharing false(MSSfalse)$( {{\mathrm{MSS}}} )$ scheme [14–22]. MSS${\mathrm{MSS}}$ schemes can be categorized into two types based on secret reconstruction: multi‐stage secret sharing false(MSSSfalse)$( {{\mathrm{MSSS}}} )$ and general MSS false(GMSSfalse)$( {{\mathrm{GMSS}}} )$.…”
Section: Introductionmentioning
confidence: 99%
“…To share multiple secrets among participants, a dealer employs a multi-secret sharing (MSS) scheme [14][15][16][17][18][19][20][21][22]. MSS schemes can be categorized into two types based on secret reconstruction: multi-stage secret sharing (MSSS) and general MSS (GMSS).…”
mentioning
confidence: 99%
“…A dealer shares a secret with n players in secret sharing (SS), and when the secret needs to be reconstructed, the threshold number of players can do so collaboratively. The quantum secret sharing [15,1,74,5,20,18,14,27,11,36,28,26,34,32,29,17,4,33,44,41,48,13,62] is a fundamental primitive protocol for sharing a secret in quantum cryptography, which may be considered as an extension of secret sharing. The QSS protocol can be used to create complex multiparty quantum computing protocols that are secure.…”
Section: Introductionmentioning
confidence: 99%
“…With the same purpose, in 2018 Liu [13] proposed a (t, n)-threshold secret image sharing scheme. In order to improve the efficiency of the verifiable secret sharing scheme, Mashhadi [14] and Cafaro [15] put forward their schemes respectively, but none of their schemes are unconditionally safe. In 2018, Liu and Yang [17] proposed a cheating identifiable secret sharing scheme by using the symmetric bivariate polynomial, but the scheme does not achieve fairness requirement of secret sharing.…”
Section: Introductionmentioning
confidence: 99%