A practical verifiable multi-secret sharing scheme

C.-C. Yang, T.-Y. Chang, M.-S. Hwang [C.-C. Yang, T.-Y. Chang, M.-S. Hwang, A (t,n) multi-secret sharing scheme, Applied Mathematics and Computation 151 (2004) 483-490] proposed an efficient multi-secret sharing scheme based on a two-variable one-way function in 2004. But the scheme doesn't have the property of verification. A practical verifiable multi-secret sharing scheme, which is based on the YCH scheme and the intractability of the discrete logarithm, is proposed in this paper. Our scheme solves the problems in the YCH scheme; each participant chooses her/his own shadow by her/himself, so the system doesn't need a security channel and the cost of the system can be lowered. The scheme can be used in practice widely.

[1]  Dieter Gollmann,et al.  Secret Sharing with Reusable Polynomials , 1997, ACISP.

[2]  Min-Shiang Hwang,et al.  A (t, n) multi-secret sharing scheme , 2004, Appl. Math. Comput..

[3]  Hung-Yu Chien,et al.  A Practical ( t , n ) Multi-Secret Sharing Scheme , 2000 .

[4]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[5]  Baruch Awerbuch,et al.  Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[6]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[7]  Ed Dawson,et al.  Multistage secret sharing based on one-way function , 1994 .

[8]  Zhenfu Cao,et al.  A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme , 2005, Appl. Math. Comput..

[9]  Chin-Chen Chang,et al.  An on-line secret sharing scheme for multi-secrets , 1998, Comput. Commun..

[10]  Martin Tompa,et al.  How to share a secret with cheaters , 1988, Journal of Cryptology.

[11]  J. He,et al.  Multisecret-sharing scheme based on one-way function , 1995 .

[12]  L. Harn Efficient sharing (broadcasting) of multiple secrets , 1995 .