Cheating identifiable secret sharing scheme using symmetric bivariate polynomial

Abstract In ( k, n ) secret sharing scheme, any m out of the n users ( m  ≥  k ) can reconstruct the secret and any less than k users cannot get any information on the secret. However, some cheaters can submit fake shares to fool other honest users during secret reconstruction. Cheating identification is an important technical to prevent such cheating behavior. In this paper, we consider cheating problem in bivariate polynomial based secret sharing scheme, and propose two cheating identification algorithms respectively. The first algorithm can identify cheaters by the m users who participate in secret reconstruction; the second algorithm can achieves stronger capability of cheater identification with the collaboration of the rest n − m users who are not involved in secret reconstruction. In our scheme, the cheating identification is only based on the symmetry property of bivariate polynomial and linearity of interpolated polynomial. Both the two algorithms are efficient with respect of cheater identification capabilities.

[1]  Satoshi Obana Almost Optimum t-Cheater Identifiable Secret Sharing Schemes , 2011, EUROCRYPT.

[2]  Yanxiao Liu Linear (k, n) Secret Sharing Scheme with Cheating Detection , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.

[3]  C. Pandu Rangan,et al.  The Round Complexity of Verifiable Secret Sharing: The Statistical Case , 2010, ASIACRYPT.

[4]  Ching-Nung Yang,et al.  Steganography and authentication in image sharing without parity bits , 2012 .

[5]  Hossein Ghodosi,et al.  Comments on Harn–Lin’s cheating detection scheme , 2011, Des. Codes Cryptogr..

[6]  Lein Harn,et al.  (t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial , 2017, Wirel. Pers. Commun..

[7]  Kaoru Kurosawa,et al.  Optimum Secret Sharing Scheme Secure against Cheating , 2006, SIAM J. Discret. Math..

[8]  K. Srinathan,et al.  Round-Optimal and Efficient Verifiable Secret Sharing , 2006, TCC.

[9]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[10]  Martin Tompa,et al.  How to share a secret with cheaters , 1988, Journal of Cryptology.

[11]  Kaoru Kurosawa,et al.  Optimum Secret Sharing Scheme Secure against Cheating , 1996, EUROCRYPT.

[12]  Satoshi Obana,et al.  t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes , 1995, CRYPTO.

[13]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[14]  Wei Wei,et al.  Cheating detection and cheater identification in (t, n) secret sharing scheme , 2014, Comput. Syst. Sci. Eng..

[15]  Jonathan Katz,et al.  Improving the round complexity of VSS in point-to-point networks , 2009, Inf. Comput..

[16]  Dan Tang,et al.  Secret image sharing scheme based on bivariate polynomial , 2012, 2012 2nd International Conference on Uncertainty Reasoning and Knowledge Engineering.

[17]  Yan-Xiao Liu Efficient t-cheater identifiable (k, n) secret-sharing scheme for t ⩽ [((k - 2)/2)] , 2014, IET Inf. Secur..

[18]  Lein Harn,et al.  Detection and identification of cheaters in (t, n) secret sharing scheme , 2009, Des. Codes Cryptogr..

[19]  Satoshi Takahashi,et al.  Secret Sharing Scheme Suitable for Cloud Computing , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).

[20]  Jonathan Katz,et al.  Improving the round complexity of VSS in point-to-point networks , 2008, Inf. Comput..

[21]  R. J. McEliece,et al.  On sharing secrets and Reed-Solomon codes , 1981, CACM.

[22]  Kouichi Sakurai,et al.  An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency , 2014, SPACE.

[23]  Satoshi Obana,et al.  Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution , 2006, ASIACRYPT.

[24]  Tal Rabin,et al.  Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.