Title :
Comment on a Novel Non-interactive Verifiable Secret Sharing Scheme
Author :
Wang, Feng ; Gu, Lize ; Zhou, Yousheng ; Yang, Yixian ; Zhou, Yajian
Author_Institution :
State Key Lab. of Networking & Switching Technol., Beijing Univ. of Posts & Telecommun., Beijing, China
Abstract :
In 2006, Jun et al presented a novel non-interactive verifiable secret sharing scheme constructed by Shamir´s secret sharing scheme for secure multi-party communication protocol in distributed networks. In their scheme, the Dealer only publishes one commitment for verification. The efficiency of verification for each share doesn´t fall as the augment of the threshold and the security of the verifiable secret sharing scheme is based on the intractability of computing discrete logarithm. So they demonstrated that their scheme can efficiently withstand not only the deceptive behavior between the Dealer and participants but among participants. In this paper, we analysis the security of their scheme and point out that their scheme couldn´t resist the deceptive behavior like they claimed.
Keywords :
cryptographic protocols; distributed algorithms; formal verification; computing discrete logarithm; distributed networks; noninteractive verifiable secret sharing scheme; secure multiparty communication protocol; verification efficiency; Communication switching; Communication system control; Cryptographic protocols; Cryptography; Information security; Laboratories; Phase detection; Protection; Resists; Telecommunication switching; multi-party communication; non-interactive; secret sharing; verifiable;
Conference_Titel :
Communication Software and Networks, 2010. ICCSN '10. Second International Conference on
Conference_Location :
Singapore
Print_ISBN :
978-1-4244-5726-7
Electronic_ISBN :
978-1-4244-5727-4
DOI :
10.1109/ICCSN.2010.16