Cheating prevention in secret sharing

Hossein Ghodosi, Josef Pieprzyk

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

6 Citations (Scopus)

Abstract

The commonly used technique for cheating detection requires that extra information be given to each participant. However, in a secret sharing scheme when the size of shares increases the security of the system degrades. In this paper we study the cheating problem in Shamir's scheme (in the sense of Tompa and Woll [1] attack) and present alternative solutions to this problem. First we consider cheating prevention via longer shares. Next we introduce redundant secret sharing schemes and show how they can be used for cheating prevention. Nonlinear secret sharing offers also some protection against cheaters. The work concludes with a discussion about a combined approach.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 5th Australasian Conference, ACISP 2000, Proceedings
Place of PublicationBerlin ; London
PublisherSpringer, Springer Nature
Pages328-341
Number of pages14
Volume1841
ISBN (Print)3540677429
DOIs
Publication statusPublished - 2000
Externally publishedYes
Event5th Australasian Conference on Information Security and Privacy, ACISP 2000 - Brisbane, Australia
Duration: 10 Jul 200012 Jul 2000

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1841
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other5th Australasian Conference on Information Security and Privacy, ACISP 2000
Country/TerritoryAustralia
CityBrisbane
Period10/07/0012/07/00

Fingerprint

Dive into the research topics of 'Cheating prevention in secret sharing'. Together they form a unique fingerprint.

Cite this