{"title":"Hierarchy-based cheating detection and cheater identification in secret sharing schemes","authors":"S. Banerjee, D. Gupta, G. P. Biswas","doi":"10.1109/RAIT.2018.8389094","DOIUrl":null,"url":null,"abstract":"Secret sharing scheme holds an important position in the domain of cryptography. Shamir's discovery of secret sharing scheme in 1979 followed a concept where a secret is distributed among a set of entrants, where each of the entrants gets a partial information about the secret, called the share, and pooling a minimum number of shares, called threshold, secret reconstruction is accomplished. Though, the original proposal is elegant enough, Tompa and Wall in 1988 suggested that attack by the participants is viable in Shamirs scheme. Since this finding, many works have been carried out to detect cheating and cheaters using various theories. In our work, we modify Shamir's design with the exclusive objective of detecting cheating/ identifying cheaters. We extend Shamir's threshold secret sharing scheme by adding the concept of hierarchy to achieve the objective of finding conspiracy and conspirator(s). We restrict the dealer to generate more number of shares than participants and distribute these shares based on a hierarchical model. The analysis of our design shows how the objective of cheating detection/identification is achieved with high accuracy and professionalism.","PeriodicalId":219972,"journal":{"name":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RAIT.2018.8389094","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Secret sharing scheme holds an important position in the domain of cryptography. Shamir's discovery of secret sharing scheme in 1979 followed a concept where a secret is distributed among a set of entrants, where each of the entrants gets a partial information about the secret, called the share, and pooling a minimum number of shares, called threshold, secret reconstruction is accomplished. Though, the original proposal is elegant enough, Tompa and Wall in 1988 suggested that attack by the participants is viable in Shamirs scheme. Since this finding, many works have been carried out to detect cheating and cheaters using various theories. In our work, we modify Shamir's design with the exclusive objective of detecting cheating/ identifying cheaters. We extend Shamir's threshold secret sharing scheme by adding the concept of hierarchy to achieve the objective of finding conspiracy and conspirator(s). We restrict the dealer to generate more number of shares than participants and distribute these shares based on a hierarchical model. The analysis of our design shows how the objective of cheating detection/identification is achieved with high accuracy and professionalism.