Hierarchy-based cheating detection and cheater identification in secret sharing schemes

S. Banerjee, D. Gupta, G. P. Biswas
{"title":"Hierarchy-based cheating detection and cheater identification in secret sharing schemes","authors":"S. Banerjee, D. Gupta, G. P. Biswas","doi":"10.1109/RAIT.2018.8389094","DOIUrl":null,"url":null,"abstract":"Secret sharing scheme holds an important position in the domain of cryptography. Shamir's discovery of secret sharing scheme in 1979 followed a concept where a secret is distributed among a set of entrants, where each of the entrants gets a partial information about the secret, called the share, and pooling a minimum number of shares, called threshold, secret reconstruction is accomplished. Though, the original proposal is elegant enough, Tompa and Wall in 1988 suggested that attack by the participants is viable in Shamirs scheme. Since this finding, many works have been carried out to detect cheating and cheaters using various theories. In our work, we modify Shamir's design with the exclusive objective of detecting cheating/ identifying cheaters. We extend Shamir's threshold secret sharing scheme by adding the concept of hierarchy to achieve the objective of finding conspiracy and conspirator(s). We restrict the dealer to generate more number of shares than participants and distribute these shares based on a hierarchical model. The analysis of our design shows how the objective of cheating detection/identification is achieved with high accuracy and professionalism.","PeriodicalId":219972,"journal":{"name":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RAIT.2018.8389094","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Secret sharing scheme holds an important position in the domain of cryptography. Shamir's discovery of secret sharing scheme in 1979 followed a concept where a secret is distributed among a set of entrants, where each of the entrants gets a partial information about the secret, called the share, and pooling a minimum number of shares, called threshold, secret reconstruction is accomplished. Though, the original proposal is elegant enough, Tompa and Wall in 1988 suggested that attack by the participants is viable in Shamirs scheme. Since this finding, many works have been carried out to detect cheating and cheaters using various theories. In our work, we modify Shamir's design with the exclusive objective of detecting cheating/ identifying cheaters. We extend Shamir's threshold secret sharing scheme by adding the concept of hierarchy to achieve the objective of finding conspiracy and conspirator(s). We restrict the dealer to generate more number of shares than participants and distribute these shares based on a hierarchical model. The analysis of our design shows how the objective of cheating detection/identification is achieved with high accuracy and professionalism.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于层次结构的秘密共享方案作弊检测与作弊者识别
秘密共享方案在密码学领域中占有重要地位。Shamir在1979年发现了秘密共享方案,其概念是将秘密分配给一组参与者,其中每个参与者获得关于该秘密的部分信息,称为份额,并汇集最小数量的份额,称为阈值,完成秘密重建。虽然最初的提议足够优雅,但Tompa和Wall在1988年提出,参与者的攻击在Shamirs计划中是可行的。自这一发现以来,人们利用各种理论开展了许多工作来检测作弊和作弊者。在我们的工作中,我们修改了Shamir的设计,其唯一目标是检测作弊/识别作弊者。我们扩展了Shamir的阈值秘密共享方案,加入了层次的概念,以达到发现阴谋和阴谋者的目的。我们限制经销商产生比参与者更多的股份,并基于层次模型分配这些股份。通过对我们设计的分析,可以看出我们是如何以较高的准确性和专业性实现作弊检测/识别的目标的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Analysis of slope stability and detection of critical failure surface using gravitational search algorithm Prioritization of human errors in EOT crane operations and its visualisation using virtual simulation Impact of land use dynamics on land surface temperature in Jharia coalfield Application of fractional calculus to distinguish left ventricular hypertrophy with normal ECG Miniaturization of Vivaldi antenna for different wireless communication applications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1