Provably secure verifiable multi-stage secret sharing scheme based on monotone span program

In multi-secret sharing (MSS) scheme, a dealer distributes multiple secrets among a set of participants, each of them according to an access structure. In this study, the authors propose a novel linear MSS with computational verifiability that provide many functions for practical applications in comparison with the previous works focusing on MSS schemes in the general scenario. This scheme has the same advantages as previous schemes; moreover, it is verifiable and multi-use secret sharing. Furthermore, in this scheme the secret reconstruction is according to the dealer's preassigned order. Also, they prove the security of the authors’ scheme in the standard model.

[1]  Qi Cheng,et al.  An ideal multi-secret sharing scheme based on MSP , 2011, Inf. Sci..

[2]  Mohammad Reza Aref,et al.  Efficient multistage secret sharing scheme using bilinear map , 2014, IET Inf. Secur..

[3]  Liangliang Xiao,et al.  Linear multi-secret sharing schemes based on multi-party computation , 2006, Finite Fields Their Appl..

[4]  Samaneh Mashhadi How to Fairly Share Multiple Secrets Stage by Stage , 2016, Wirel. Pers. Commun..

[5]  Lein Harn,et al.  Unconditionally Secure Verifiable Secret Sharing Scheme , 2012 .

[6]  Ziba Eslami,et al.  A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps , 2012, Wirel. Pers. Commun..

[7]  Yuh-Min Tseng,et al.  Publicly verifiable multi-secret sharing scheme from bilinear pairings , 2013, IET Inf. Secur..

[8]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[9]  Yanxiao Liu Linear (k, n) Secret Sharing Scheme with Cheating Detection , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.

[10]  Lein Harn,et al.  An Ideal Multi-secret Sharing Scheme Based on Connectivity of Graphs , 2014, Wirel. Pers. Commun..

[11]  Ed Dawson,et al.  Multistage secret sharing based on one-way function , 1994 .

[12]  Germán Sáez,et al.  Sharing many secrets with computational provable security , 2013, Inf. Process. Lett..

[13]  Wei-Pang Yang,et al.  A new multi-stage secret sharing scheme using one-way function , 2005, OPSR.

[14]  Qi Cheng,et al.  A novel linear multi-secret sharing scheme for group communication in wireless mesh networks , 2011, J. Netw. Comput. Appl..

[15]  Samaneh Mashhadi,et al.  Secure publicly verifiable and proactive secret sharing schemes with general access structure , 2017, Inf. Sci..

[16]  Yan-Xiao Liu Efficient t-cheater identifiable (k, n) secret-sharing scheme for t ⩽ [((k - 2)/2)] , 2014, IET Inf. Secur..

[17]  Yu-Min Wang,et al.  A New (t, n) Multi-Secret Sharing Scheme , 2005, 2008 International Conference on Computer and Electrical Engineering.

[18]  Mohammad Sayad Haghighi,et al.  Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps , 2015, IET Inf. Secur..

[19]  Avishek Adhikari,et al.  An efficient multi-use multi-secret sharing scheme based on hash function , 2010, Appl. Math. Lett..

[20]  Massoud Hadian Dehkordi,et al.  Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem , 2015, Inf. Sci..

[21]  Jie Zhang,et al.  Information-theoretical secure verifiable secret sharing with vector space access structures over bilinear groups and its applications , 2015, Future Gener. Comput. Syst..

[22]  Zhenfu Cao,et al.  A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme , 2005, Appl. Math. Comput..