Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks
Author(s) -
Yuanju Gan,
Lihua Wang,
Licheng Wang,
Ping Pan,
Yixian Yang
Publication year - 2013
Publication title -
international journal of distributed sensor networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.324
H-Index - 53
eISSN - 1550-1477
pISSN - 1550-1329
DOI - 10.1155/2013/902462
Subject(s) - verifiable secret sharing , secret sharing , computer science , homomorphic secret sharing , computer security , secure multi party computation , bilinear interpolation , shared secret , key distribution , shamir's secret sharing , scheme (mathematics) , secure channel , theoretical computer science , cryptography , public key cryptography , encryption , set (abstract data type) , mathematics , mathematical analysis , computer vision , programming language
Secret sharing is an important aspect of key management in wireless ad hoc and sensor networks. In this paper, we define a new secure model of secret sharing, use the Lagrange interpolation and the bilinear cyclic groups to construct an efficient publicly verifiable secret sharing scheme on the basis of this model, and show that this scheme is provably secure against adaptively chosen secret attacks (CSAs) based on the decisional bilinear Diffie-Hellman (DBDH) problem. We find that this scheme has the following properties: (a) point-to-point secure channels are not required in both the secret distribution phase and the secret reconstruction phase; (b) it is a noninteractive secret sharing system in that the participants need not communicate with each other during subshadow verification; and (c) each participant is able to share many secrets with other participants despite holding only one shadow. © 2013 Yuanju Gan et al.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom