Title :
A (t, n)-Threshold Verified Multi-secret Sharing Scheme Based on ECDLP
Author :
Shi, Runhua ; Zhong, Hong ; Huang, Liusheng
Author_Institution :
Anhui Univ., Hefei
fDate :
July 30 2007-Aug. 1 2007
Abstract :
In this article, we propose a (t,n) threshold verifiable multi-secret sharing scheme, in which to reconstruct t secrets needs to solve t simultaneous equations. The analysis results show that our scheme is as easy as Yang´s scheme [8] in the secret reconstruction and requires less public values than Chien´s [7] and Yang´s schemes. Furthermore, the shares in our scheme can be verified their validity with t public values based on ECDLP, and there are two verified forms: one is computationally secure as Feldman ´s scheme [12] and other is unconditionally secure as Pedersen´s scheme [13]. In addition, for the main computation: ai,1P1 + ai,2P2 + hellip + ai,tPt in our scheme, we present a new method based on the signed factorial expansion and implement it, the results show that it is more efficient than the current public methods. Thus our scheme is a secure and efficient (t,n) threshold verified multi-secret sharing scheme.
Keywords :
cryptography; elliptic curve discrete logarithm problem; signed factorial expansion; threshold verifiable multisecret sharing scheme; Artificial intelligence; Computer networks; Distributed computing; Elliptic curve cryptography; Elliptic curves; Equations; Intelligent networks; Laboratories; Public key cryptography; Software engineering; ECDLP; Multi-scalar multiplication; Multi-secret sharing; Verified scheme;
Conference_Titel :
Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on
Conference_Location :
Qingdao
Print_ISBN :
978-0-7695-2909-7
DOI :
10.1109/SNPD.2007.416