How to share a secret with cheaters
Proceedings on Advances in cryptology---CRYPTO '86
A hierarchy of polynomial time lattice basis reduction algorithms
Theoretical Computer Science
Fully dynamic secret sharing schemes
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Lattice basis reduction: improved practical algorithms and solving subset sum problems
Mathematical Programming: Series A and B
On sharing secrets and Reed-Solomon codes
Communications of the ACM
Communications of the ACM
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Fundamentals of Computer Security
Fundamentals of Computer Security
Verifiable Democracy a Protocol to Secure an Electronic Legislature
EGOV '02 Proceedings of the First International Conference on Electronic Government
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Cheating Immune Secret Sharing
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Constructions of Cheating Immune Secret Sharing
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Society and Group Oriented Cryptography: A New Concept
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Cheating Prevention in Secret Sharing over GF(pt)
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Optimal-resilience proactive public-key cryptosystems
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
List Decoding of Error-Correcting Codes: Winning Thesis of the 2002 ACM Doctoral Dissertation Competition (Lecture Notes in Computer Science)
Correcting Errors Beyond the Guruswami-Sudan Radius in Polynomial Time
FOCS '05 Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science
Noisy polynomial interpolation and noisy chinese remaindering
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Efficient multicast stream authentication for the fully adversarial network model
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Improved decoding of Reed-Solomon and algebraic-geometry codes
IEEE Transactions on Information Theory
Detection and identification of cheaters in (t, n) secret sharing scheme
Designs, Codes and Cryptography
Hi-index | 0.00 |
In this paper, we investigate the problem of increasing the threshold parameter of the Shamir (t,n)-threshold scheme without interacting with the dealer. Our construction will reduce the problem of secret recovery to the polynomial reconstruction problem which can be solved using a recent algorithm by Guruswami and Sudan. In addition to be dealer-free, our protocol does not increase the communication cost between the dealer and the n participants when compared to the original (t,n)-threshold scheme. Despite an increase of the asymptotic time complexity at the combiner, we show that recovering the secret from the output of the previous polynomial reconstruction algorithm is still realistic even for large values of t. Furthermore the scheme does not require every share to be authenticated before being processed by the combiner. This will enable us to reduce the number of elements to be publicly known to recover the secret to one digest produced by a collision resistant hash function which is smaller than the requirements of most verifiable secret sharing schemes.