Chinese Journal of Network and Information Security ›› 2019, Vol. 5 ›› Issue (1): 22-29.doi: 10.11959/j.issn.2096-109x.2019003

• Special Column:Technology Research and Application Exploration on Attack and Defense of Cryptology • Previous Articles     Next Articles

Fair secret sharing scheme using asymmetric bivariate polynomial

Wenwei YANG,Yuqing XING   

  1. Information Engineering University,Zhengzhou 450001,China
  • Revised:2019-01-04 Online:2019-02-01 Published:2019-04-10
  • Supported by:
    The National Key R&D Plan Program of China(2016YFB0801601);The National Key R&D Plan Program of China(2016YFB0801505)

Abstract:

In Shamir's (t,n) secret sharing scheme,any m (m≥t) participants can reconstruct the secret,and any less than t participants can't get any information about the secret.However,if there are more than t participants in the secret reconstruction phase,Shamir's secret reconstruction phase can not prevent external attackers from knowing the secret,while internal attackers can release a fake share to deceive honest participants during the secret reconstruction process.A rational threshold secret sharing scheme using asymmetric bivariate polynomial with unknown rounds is proposed.Then it shows its fairness and security against non-cooperative attack with synchronization,non-cooperative attack with a synchronization,cooperative attack with synchronization and cooperative attack with a synchronization.

Key words: threshold secret sharing, asymmetric bivariate polynomial, fairness, attack model

CLC Number: 

No Suggested Reading articles found!