An efficient threshold verifiable multi-secret sharing

In 2004, C.-C. Yang, T.-Y. Chang and M.-S. Hwang proposed an efficient multi-secret sharing scheme based on two-variable one-way function and Shamir's secret sharing. In order to add the verifiable property into previous scheme, J. Shao and Z. Cao proposed an efficient (t,n) verifiable multi-secret sharing based on YCH [C.-C. Yang, T.-Y. Chang, M.-S. Hwang, A (t,n) multi-secret sharing scheme, Applied Mathematics and Computation 151 (2004) pp. 483-490.] in 2005. Both of the previous schemes need a secure channel. This paper presents a verifiable multi-secret sharing based on YCH, intractability of Discrete Logarithm (DL) and RSA cryptosystem. In our scheme each participant chooses her/his shadow by her/himself and there is not any need to a secure channel. In addition, compared with Shao and Cao scheme, verifiable property is more efficient in our scheme.

[1]  J. He,et al.  Multisecret-sharing scheme based on one-way function , 1995 .

[2]  Zhenfu Cao,et al.  A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme , 2005, Appl. Math. Comput..

[3]  Rong Zhao,et al.  A practical verifiable multi-secret sharing scheme , 2007, Comput. Stand. Interfaces.

[4]  Hung-Yu Chien,et al.  A Practical ( t , n ) Multi-Secret Sharing Scheme , 2000 .

[5]  M.I. Aziz,et al.  Introduction to Cryptography , 2002, 2005 International Conference on Microelectronics.

[6]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[7]  Baruch Awerbuch,et al.  Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[8]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice,Second Edition , 2002 .

[9]  Chin-Chen Chang,et al.  An on-line secret sharing scheme for multi-secrets , 1998, Comput. Commun..

[10]  Dieter Gollmann,et al.  Secret Sharing with Reusable Polynomials , 1997, ACISP.

[11]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[12]  Min-Shiang Hwang,et al.  A (t, n) multi-secret sharing scheme , 2004, Appl. Math. Comput..

[13]  Ed Dawson,et al.  Multistage secret sharing based on one-way function , 1994 .

[14]  L. Harn Efficient sharing (broadcasting) of multiple secrets , 1995 .

[15]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .