Verifiable multi-secret sharing schemes for multiple threshold access structures

Christophe Tartary*, Josef Pieprzyk, Huaxiong Wang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

8 Citations (Scopus)

Abstract

A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. In 2005, Shao and Cao developed a verifiable multi-secret sharing scheme where each participant's share can be used several times which reduces the number of interactions between the dealer and the group members. In addition some secrets may require a higher security level than others involving the need for different threshold values. Recently Chan and Chang designed such a scheme but their construction only allows a single secret to be shared per threshold value. In this article we combine the previous two approaches to design a multiple time verifiable multi-secret sharing scheme where several secrets can be shared for each threshold value. Since the running time is an important factor for practical applications, we will provide a complexity comparison of our combined approach with respect to the previous schemes.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - Third SKLOIS Conference, Inscrypt 2007, Revised Selected Papers
EditorsDingyi Pei, Moti Yung, Chuankun Wu
Place of PublicationNew York
PublisherSpringer, Springer Nature
Pages167-181
Number of pages15
Volume4990 LNCS
ISBN (Print)3540794980, 9783540794981
DOIs
Publication statusPublished - 2008
Event3rd SKLOIS Conference on Information Security and Cryptology, Inscrypt 2007 - Xining, China
Duration: 31 Aug 20075 Sept 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4990 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other3rd SKLOIS Conference on Information Security and Cryptology, Inscrypt 2007
Country/TerritoryChina
CityXining
Period31/08/075/09/07

Fingerprint

Dive into the research topics of 'Verifiable multi-secret sharing schemes for multiple threshold access structures'. Together they form a unique fingerprint.

Cite this