Abstract

In a threshold secret sharing scheme, a dishonest participant can disrupt the operation of the system by submitting junk instead of his/her share. We propose two constructions for threshold secret sharing schemes that allow identification of cheaters where the secret is an element of the ringZ m . The main motivation of this work is to design RSA-based threshold cryptosystems, such as robust threshold RSA signature, in which additive (multiplicative) threshold secret sharing schemes over Abelian groups with cheater identification play the central role. The first construction extends Desmedt-Frankel’s construction of secret sharing over Z m to provide cheater detection, and the second construction uses perfect hash families to construct a robust (t, n) scheme from a (t, t) scheme. We prove security of these schemes and assess their performance.KeywordsSecret SharingInformation RateSecret Sharing SchemeThreshold SchemeDistribution AlgorithmThese keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.