Verifiable vector space secret sharing scheme without a dealer

In this article, a secure and verifiable vector space secret sharing scheme without a dealer is proposed in detail. It's security is based on the security of elliptic curve cryptography. This scheme has the following characteristics: There is no dealer, thus the cost can be saved and it makes the scheme more security. A verifiable infrastructure based on elliptic curve cryptography is provided, which can be used to detect the cheaters from participants and outside attackers. Meanwhile, the length of key of elliptic curve cryptography is much less than that of RSA cryptography, so the current scheme is valuable in applications with limited memory and communication bandwidth. Results indicate that the security and information rate of this scheme is very high. Analysis shows that this scheme is perfect.

[1]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[2]  Liu Mu-lan Secret Sharing Schemes and Secure Multi-party Computation , 2006 .

[3]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[4]  Torben P. Pedersen A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.

[5]  Xu Chun A vector space secret sharing scheme against cheating , 2002 .

[6]  Maged Hamada Ibrahim,et al.  Verifiable Threshold Sharing of a Large Secret Safe-Prime , 2005, ITCC.

[7]  Carles Padró,et al.  Detection of Cheaters in Vector Space Secret Sharing Schemes , 1999, Des. Codes Cryptogr..

[8]  Gustavus J. Simmons,et al.  A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party , 1991, EUROCRYPT.

[9]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[10]  Xu Chun A Secure Vector Space Secret Sharing Scheme , 2002 .

[11]  Xuezeng Pan,et al.  Secure and verifiable vector space secret sharing scheme , 2004, 8th International Conference on Computer Supported Cooperative Work in Design.

[12]  Berry Schoenmakers Verifiable Secret Sharing , 2011, Encyclopedia of Cryptography and Security.

[13]  Lein Harn,et al.  Strong (n, t, n) verifiable secret sharing scheme , 2010, Inf. Sci..

[15]  Li Hui Publicly Verifiable Secret Sharing Schemes in Vector Space , 2004 .

[16]  Ernest F. Brickell,et al.  Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.

[17]  A. H. El-Sawi,et al.  A robust threshold elliptic curve digital signature providing a new verifiable secret sharing scheme , 2003, 2003 46th Midwest Symposium on Circuits and Systems.

[18]  Shufen Liu,et al.  An ECC based vector space key sharing scheme , 2006, 2006 First International Symposium on Pervasive Computing and Applications.