z-logo
open-access-imgOpen Access
Outsourcing secret sharing scheme based on homomorphism encryption
Author(s) -
Zhang En,
Peng Jie,
Li Ming
Publication year - 2018
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2017.0026
Subject(s) - verifiable secret sharing , secret sharing , computer science , homomorphic secret sharing , secure multi party computation , outsourcing , cryptography , encryption , zero knowledge proof , computer security , scheme (mathematics) , shamir's secret sharing , homomorphism , cloud computing , theoretical computer science , mathematics , set (abstract data type) , mathematical analysis , discrete mathematics , political science , law , programming language , operating system
Secret sharing is an important component of cryptography protocols and has a wide range of practical applications. However, the existing secret sharing schemes cannot apply to computationally weak devices and cannot efficiently guarantee fairness. In this study, a novel outsourcing secret sharing scheme is proposed. In the setting of outsourcing secret sharing, clients only need a small amount of decryption and verification operations, while the expensive reconstruction computation and verifiable computation can be outsourced to cloud service providers (CSP). The scheme does not require complex interactive argument or zero‐knowledge proof. The malicious behaviour of clients and CSP can be detected in time. Moreover, the CSP cannot get any useful information about the secret, and it is fair for every client to obtain the secret. At the end of this study, the authors prove the security of the proposed scheme and compare it with other secret sharing schemes.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here