An efficient multi-use multi-secret sharing scheme based on hash function

In this work, a renewable, multi-use, multi-secret sharing scheme for general access structure based on the one-way collision resistant hash function is presented in which each participant has to carry only one share. As it applies the collision resistant one-way hash function, the proposed scheme is secure against conspiracy attacks even if the pseudo-secret shares are compromised. Moreover, high complexity operations like modular multiplication, exponentiation and inversion are avoided to increase its efficiency. Finally, in the proposed scheme, both the combiner and the participants can verify the correctness of the information exchanged among themselves.

[1]  Markus Stadler,et al.  Publicly Verifiable Secret Sharing , 1996, EUROCRYPT.

[2]  Hong Fan,et al.  A New Multi-secret Sharing Scheme with Multi-policy , 2007, The 9th International Conference on Advanced Communication Technology.

[3]  Yu-Min Wang,et al.  A Secure and Efficient Secret Sharing Scheme with General Access Structures , 2006, FSKD.

[4]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[5]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[6]  Massoud Hadian Dehkordi,et al.  An efficient threshold verifiable multi-secret sharing , 2008, Comput. Stand. Interfaces.

[7]  T.-C. Wu,et al.  (t,n) threshold verifiable multisecret sharing scheme based on factorisation intractability and discrete logarithm modulo a composite problems , 1999 .

[8]  Pang Liaojun,et al.  An efficient and secure multi-secret sharing scheme with general access structures , 2006, Wuhan University Journal of Natural Sciences.

[9]  Y. Yeh,et al.  Dynamic Multi-Secret Sharing Scheme , 2008 .

[10]  Yun Wei,et al.  A Multi-Stage Secret Sharing Scheme with General Access Structures , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[11]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[12]  Ed Dawson,et al.  Multistage secret sharing based on one-way function , 1994 .

[13]  Wei-Pang Yang,et al.  An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme , 2005, Appl. Math. Comput..

[14]  Justie Su-tzu Juan,et al.  An Efficient and Secure Multi-secret Image Sharing Scheme with General Access Structure , 2009, 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement.