Linear (k, n) Secret Sharing Scheme with Cheating Detection

Linear (k,n) secret sharing scheme is a class of (k,n) secret sharing, where all the n shares of a secret satisfy a linear relationship. It plays an important role in other cryptographic systems, such as multi-party computation and function sharing schemes. On the other hand, cheating problem in (k,n) secret sharing is an important issue, such that cheaters (dishonest players) submit forged shares during secret reconstruction to fool honest players. During decades of research on cheating prevention, vast (k,n) secret sharing schemes against cheating have been proposed. However, most of these schemes are not linear schemes since it contains redundant information in their shares to achieve cheating detection. Since linear (k,n) secret sharing is an important primitive in threshold cryptography, linear (k,n) secret sharing scheme with the capability of cheating detection is also worthwhile to be discussed. In this paper, we propose a linear (k,n) secret sharing scheme against cheating based on Shamir's original scheme, which possesses the following merits: (1) Our scheme is just combination of two Shamir's schemes. Therefore, our scheme can be used in other threshold cryptographic systems which are based on Shamir's scheme. (2) The size of share in proposed scheme almost reaches its theoretic lower bound in (k,n) secret sharing with cheating detection. (3) In the phase of cheating detection, only one honest player can detect the cheating from other k-1 cheaters, which achieves a stronger detection effective than the previous linear secret sharing schemes against cheating.

[1]  Toshinori Araki Efficient (k, n) Threshold Secret Sharing Schemes Secure Against Cheating from n-1 Cheaters , 2007, ACISP.

[2]  Bart Preneel,et al.  Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case , 2003, IACR Cryptol. ePrint Arch..

[3]  Yvo Desmedt,et al.  Threshold Cryptosystems , 1989, CRYPTO.

[4]  Martin Tompa,et al.  How to share a secret with cheaters , 1988, Journal of Cryptology.

[5]  Alfredo De Santis,et al.  Size of Shares and Probability of Cheating in Threshold Schemes , 1994, EUROCRYPT.

[6]  Yvo Desmedt,et al.  Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.

[7]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[8]  Ueli Maurer,et al.  General Secure Multi-party Computation from any Linear Secret-Sharing Scheme , 2000, EUROCRYPT.

[9]  MARCO CARPENTIERI A perfect threshold secret sharing scheme to identify cheaters , 1995, Des. Codes Cryptogr..

[10]  John Bloom,et al.  A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.

[11]  Bart Preneel,et al.  Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case , 2003, ACNS.

[12]  Yan-Xiao Liu Efficient t-cheater identifiable (k, n) secret-sharing scheme for t ⩽ [((k - 2)/2)] , 2014, IET Inf. Secur..

[13]  Satoshi Obana,et al.  t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes , 1995, CRYPTO.

[14]  Hugo Krawczyk,et al.  Robust Threshold DSS Signatures , 1996, EUROCRYPT.

[15]  Satoshi Obana Almost Optimum t-Cheater Identifiable Secret Sharing Schemes , 2011, EUROCRYPT.

[16]  Xian-Mo Zhang,et al.  Cheating Prevention in Linear Secret Sharing , 2002, ACISP.

[17]  C. Padró,et al.  Secret Sharing Schemes with Detection of Cheaters for a General Access Structure , 2002 .

[18]  Kaoru Kurosawa,et al.  Optimum Secret Sharing Scheme Secure against Cheating , 1996, EUROCRYPT.

[19]  Hossein Ghodosi,et al.  Comments on Harn–Lin’s cheating detection scheme , 2011, Des. Codes Cryptogr..

[20]  Chin-Chen Chang,et al.  A novel efficient (t, n) threshold proxy signature scheme , 2006, Inf. Sci..

[21]  Satoshi Obana,et al.  Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution , 2006, ASIACRYPT.

[22]  Avi Wigderson,et al.  On span programs , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.

[23]  Lein Harn,et al.  Detection and identification of cheaters in (t, n) secret sharing scheme , 2009, Des. Codes Cryptogr..

[24]  David Chaum,et al.  Multiparty unconditionally secure protocols , 1988, STOC '88.