Abstract | ||
---|---|---|
Secret sharing technology is being again on the agenda when the security of big data and cloud computing is becoming a thorny problem. In a (t, n) secret sharing scheme, a secret data is distributed by a mutually trusted dealer to n shareholders by this means that the secret could not be obtained and reconstructed by less than t shareholders unless the number is no less than t. However, dishonest shareholders can fool other honest shareholders by presenting fake shares in the secret reconstruction phase. Therefore, cheating detection and cheater identification are very important to achieving fair secret reconstruction. In this paper, we propose a (t, n) detecting and identifying secret sharing scheme (DISS) based on the symmetric bivariate polynomial. In our (t, n) DISS, we use the property of symmetry to detect cheating, and use voting to identify cheaters. Furthermore, detection and identification abilities, and the thresholds in voting are discussed under three types of attack. |
Year | DOI | Venue |
---|---|---|
2014 | null | COMPUTER SYSTEMS SCIENCE AND ENGINEERING |
Keywords | Field | DocType |
Secret sharing,cheating detection,cheater identification,voting | Internet privacy,Secret sharing,Computer science,Cheating | Journal |
Volume | Issue | ISSN |
29 | SP1 | 0267-6192 |
Citations | PageRank | References |
1 | 0.37 | 0 |
Authors | ||
7 |
Name | Order | Citations | PageRank |
---|---|---|---|
Wang Zhi-xiao | 1 | 37 | 12.28 |
Yanxiao Liu | 2 | 1 | 0.37 |
Wenyao Yan | 3 | 12 | 3.95 |
Wei Wei | 4 | 507 | 68.07 |
Junhuai Li | 5 | 39 | 16.44 |
Deyun Zhang | 6 | 52 | 14.54 |
Omar Alfandi | 7 | 90 | 22.16 |