{"title":"Verifiable Secret Sharing Scheme Using Hash Values","authors":"J. Imai, M. Mimura, Hidema Tanaka","doi":"10.1109/CANDARW.2018.00081","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a method for secret sharing scheme to identify cheaters and verify reconstructed secret, using hash values calculated following 2×(m + n-k)-regular graph. Our purpose is to solve disadvantages to known previous methods and our contribution is as followings; (i) it can be applied to any secret sharing scheme, and (ii) the size of a share is related only to the number of cheaters that we set, even if the size of secret value increases. As the result, if the number of cheater is less than or equal to the setting number, we can certainly identify a malicious action, and also we can judge whether result of reconstruction is true or false. We conclude that our proposal method is sufficiently practical.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CANDARW.2018.00081","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
In this paper, we propose a method for secret sharing scheme to identify cheaters and verify reconstructed secret, using hash values calculated following 2×(m + n-k)-regular graph. Our purpose is to solve disadvantages to known previous methods and our contribution is as followings; (i) it can be applied to any secret sharing scheme, and (ii) the size of a share is related only to the number of cheaters that we set, even if the size of secret value increases. As the result, if the number of cheater is less than or equal to the setting number, we can certainly identify a malicious action, and also we can judge whether result of reconstruction is true or false. We conclude that our proposal method is sufficiently practical.