An Efficient V-Fairness (t, n) Threshold Secret Sharing Scheme

Lee and Laih proposed a v-fairness (t, n) secret sharing scheme such that the participants can recover a secret without providing their shadows simultaneously. Besides, the honest participants can obtain the secret even if there are v cheaters among the t participants in their scheme, where v

[1]  Lein Harn,et al.  Strong (n, t, n) verifiable secret sharing scheme , 2010, Inf. Sci..

[2]  Chin-Chen Chang,et al.  Enhancing the efficiency of (v, r, n)-fairness secret sharing scheme , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..

[3]  C.-S. Laih,et al.  V-fairness (t, n) secret sharing scheme , 1997 .

[4]  Hung-Yu Chien,et al.  A Practical ( t , n ) Multi-Secret Sharing Scheme , 2000 .

[5]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[6]  R.-J. Hwang,et al.  Efficient cheater identification method for threshold schemes , 1997 .

[7]  Tan Kai CHEATER IDENTIFICATION IN ( t,n ) THRESHOLD SCHEME , 1999 .

[8]  Tal Rabin,et al.  Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.

[9]  Martin Tompa,et al.  How to share a secret with cheaters , 1988, Journal of Cryptology.

[10]  Min-Shiang Hwang,et al.  A (t, n) multi-secret sharing scheme , 2004, Appl. Math. Comput..

[11]  Lein Harn,et al.  Fair Reconstruction of a Secret , 1995, Inf. Process. Lett..

[12]  Yuh-Min Tseng Multi-party key agreement protocols with cheater identification , 2003, Appl. Math. Comput..

[13]  MARCO CARPENTIERI A perfect threshold secret sharing scheme to identify cheaters , 1995, Des. Codes Cryptogr..

[14]  Tzonelih Hwang,et al.  (t,m) THRESHOLD AND GENERALIZED ID-BASED CONFERENCE KEY DISTRIBUTION SYSTEM , 2000, Cryptologia.

[15]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[16]  Kwok-Yan Lam,et al.  On identification secret sharing schemes , 2003, Inf. Comput..

[17]  Tzong-Chen Wu,et al.  Cheating detection and cheater identification in secret sharing schemes , 1995 .