DocumentCode
3063471
Title
A simple secret sharing scheme using a key and its security against substitution of shares
Author
Koga, Hiroki
Author_Institution
Grad. Sch. of Syst. & Inf. Eng., Univ. of Tsukuba, Tsukuba, Japan
fYear
2010
fDate
13-18 June 2010
Firstpage
2483
Lastpage
2487
Abstract
Secret sharing schemes which are secure under the presence of malicious participants who forge their shares have been investigated by many researchers so far. In this paper we consider a secret sharing scheme with a key at an encoder and a decoder and analyze its security against the substitution attack by malicious participants. We first give conditions that the secret sharing scheme with a key must satisfy. Next, we construct a simple secret sharing scheme with a key that generates n shares and detects forged shares with high probability. We can prove that, if at most n - 1 malicious participants collude and try to deceive the other participants by forged shares optimally, the success probability of such an attack is upper-bounded by |S|-1/|X|-1, where |S| and |X| denote the sizes of the secret and the n shares, respectively. In addition, we investigate basic properties of the scheme especially for the case of n = 2.
Keywords
decoding; encoding; probability; public key cryptography; decoder key; encoder key; forged shares detection; malicious participants; probability; secret sharing scheme; substitution attack security; success probability; Authentication; Combinatorial mathematics; Cryptography; Decoding; Galois fields; Information security; Polynomials; Systems engineering and theory; Upper bound;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on
Conference_Location
Austin, TX
Print_ISBN
978-1-4244-7890-3
Electronic_ISBN
978-1-4244-7891-0
Type
conf
DOI
10.1109/ISIT.2010.5513434
Filename
5513434
Link To Document