How to share a secret with cheaters
Journal of Cryptology
Verifiable secret sharing and multiparty protocols with honest majority
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
Fair reconstruction of a secret
Information Processing Letters
Communications of the ACM
How to Fairly Reconstruct a Shared Secret
Proceedings of the International Conference on Cryptography: Policy and Algorithms
Enhancing the Efficiency of (v, r, n)-Fairness Secret Sharing Scheme
AINA '04 Proceedings of the 18th International Conference on Advanced Information Networking and Applications - Volume 2
Hi-index | 0.00 |
Secret sharing scheme is an important method to share secrets among all participants. Though there are many secret sharing schemes proposed, however, most of the schemes are unfair. For a fair secret sharing scheme, even if there are participants are dishonest, the probability to recover the shared secret is still equal for all participants without releasing their shadows simultaneously. In this article, we propose a simple (v, t, n)-fairness secret sharing scheme. The (v, t, n)-fairness secret sharing scheme is a (t, n) secret sharing scheme with the feature that if there are v, v t/2, share holders being dishonest, all other share holders still have equal probability to obtain the secret without releasing their shadows simultaneously. The merit of the proposed scheme is that each participant holds only one shadow such that it is convenient and practical for all users, and the computational complexity is quite low for cheater detection or identification.