@inproceedings{7d6c3a510e974aed8d91aa1578817682,
title = "Cheating prevention in linear secret sharing",
abstract = "Cheating detection in linear secret sharing is considered. The model of cheating extends the Tompa-Woll attack and includes cheating during multiple (unsuccessful) recovery of the secret. It is shown that shares in most linear schemes can be split into subshares. Subshares can be used by participants to trade perfectness of the scheme with cheating prevention. Evaluation of cheating prevention is given in the context of different strategies applied by cheaters.",
keywords = "Cheating detection, Cheating identification, Cryptography, Linear secret sharing schemes, Secret sharing",
author = "Josef Pieprzyk and Zhang, {Xian Mo}",
year = "2002",
language = "English",
isbn = "3540438610",
volume = "2384",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer, Springer Nature",
pages = "121--135",
editor = "Lynn Batten and Jennifer Seberry",
booktitle = "Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings",
address = "United States",
note = "7th Australasian Conference on Information Security and Privacy, ACISP 2002 ; Conference date: 03-07-2002 Through 05-07-2002",
}