Xing-Fu Xu, Daoshun Wang, Shundong Li, Ching-Nung Yang
{"title":"一种基于循环码的防作弊块秘密共享方案","authors":"Xing-Fu Xu, Daoshun Wang, Shundong Li, Ching-Nung Yang","doi":"10.1109/IIH-MSP.2013.99","DOIUrl":null,"url":null,"abstract":"In secret sharing, cheaters may reconstruct and recover the secret by providing faked shares, but the honest participants get no information about it. The anti-cheating secret sharing scheme can detect cheating and identify cheaters, so that it can effectively resist cheating attacks. In this paper, we construct a Cyclic Codes-based (k, n)-block secret sharing scheme against cheating. If there are more than k participants reconstructing the secret, we can detect cheating and identify cheaters. We discuss the relationship between the length of the secret block and the computational complexity, the length of the secret block and the storage space. Also, we give the upper bound of the number of identifiable cheaters. When there are no fewer than k honest participants, we can identify all cheaters.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Anti-cheating Block Secret Sharing Scheme Based on Cyclic Codes\",\"authors\":\"Xing-Fu Xu, Daoshun Wang, Shundong Li, Ching-Nung Yang\",\"doi\":\"10.1109/IIH-MSP.2013.99\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In secret sharing, cheaters may reconstruct and recover the secret by providing faked shares, but the honest participants get no information about it. The anti-cheating secret sharing scheme can detect cheating and identify cheaters, so that it can effectively resist cheating attacks. In this paper, we construct a Cyclic Codes-based (k, n)-block secret sharing scheme against cheating. If there are more than k participants reconstructing the secret, we can detect cheating and identify cheaters. We discuss the relationship between the length of the secret block and the computational complexity, the length of the secret block and the storage space. Also, we give the upper bound of the number of identifiable cheaters. When there are no fewer than k honest participants, we can identify all cheaters.\",\"PeriodicalId\":105427,\"journal\":{\"name\":\"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing\",\"volume\":\"41 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-10-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IIH-MSP.2013.99\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IIH-MSP.2013.99","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Anti-cheating Block Secret Sharing Scheme Based on Cyclic Codes
In secret sharing, cheaters may reconstruct and recover the secret by providing faked shares, but the honest participants get no information about it. The anti-cheating secret sharing scheme can detect cheating and identify cheaters, so that it can effectively resist cheating attacks. In this paper, we construct a Cyclic Codes-based (k, n)-block secret sharing scheme against cheating. If there are more than k participants reconstructing the secret, we can detect cheating and identify cheaters. We discuss the relationship between the length of the secret block and the computational complexity, the length of the secret block and the storage space. Also, we give the upper bound of the number of identifiable cheaters. When there are no fewer than k honest participants, we can identify all cheaters.