Dazeng Yuan, Mingxing He, Shengke Zeng, Xiao Li, Long Lu
{"title":"基于多项式插值的(t,p)-阈值点函数秘密共享方案及其应用","authors":"Dazeng Yuan, Mingxing He, Shengke Zeng, Xiao Li, Long Lu","doi":"10.1145/2996890.3007871","DOIUrl":null,"url":null,"abstract":"Point function secret sharing(PFSS)was a special kind of function secret sharing(FSS)that was a special case of secret sharing, that the shared secret was a point function instead of a value. Motivated by the reason that the PFSS has very good application in the secure multi-party computations by investigating, and the existing PFSS scheme without threshold and inefficient. A new (t, p)–PFSS scheme based on polynomial interpolation was proposed, and this PFSS scheme is secure and efficient by analyzing the correctness, the security and the efficiency of the scheme, and is the first threshold PFSS scheme. Then an example was given to demonstrate scheme has effectiveness. Lastly, we respectively construct a (t, p)–threshold multi-server PIR and secure keyword search protocol, and a (t, p)–threshold incremental secret sharing protocol, both based on the proposed (t, p)–PFSS scheme, and simple analysis the correctness and the security of the first protocol.","PeriodicalId":350701,"journal":{"name":"2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC)","volume":"268 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"(t,p)-Threshold Point Function Secret Sharing Scheme Based on Polynomial Interpolation and Its Application\",\"authors\":\"Dazeng Yuan, Mingxing He, Shengke Zeng, Xiao Li, Long Lu\",\"doi\":\"10.1145/2996890.3007871\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Point function secret sharing(PFSS)was a special kind of function secret sharing(FSS)that was a special case of secret sharing, that the shared secret was a point function instead of a value. Motivated by the reason that the PFSS has very good application in the secure multi-party computations by investigating, and the existing PFSS scheme without threshold and inefficient. A new (t, p)–PFSS scheme based on polynomial interpolation was proposed, and this PFSS scheme is secure and efficient by analyzing the correctness, the security and the efficiency of the scheme, and is the first threshold PFSS scheme. Then an example was given to demonstrate scheme has effectiveness. Lastly, we respectively construct a (t, p)–threshold multi-server PIR and secure keyword search protocol, and a (t, p)–threshold incremental secret sharing protocol, both based on the proposed (t, p)–PFSS scheme, and simple analysis the correctness and the security of the first protocol.\",\"PeriodicalId\":350701,\"journal\":{\"name\":\"2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC)\",\"volume\":\"268 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2996890.3007871\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2996890.3007871","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
(t,p)-Threshold Point Function Secret Sharing Scheme Based on Polynomial Interpolation and Its Application
Point function secret sharing(PFSS)was a special kind of function secret sharing(FSS)that was a special case of secret sharing, that the shared secret was a point function instead of a value. Motivated by the reason that the PFSS has very good application in the secure multi-party computations by investigating, and the existing PFSS scheme without threshold and inefficient. A new (t, p)–PFSS scheme based on polynomial interpolation was proposed, and this PFSS scheme is secure and efficient by analyzing the correctness, the security and the efficiency of the scheme, and is the first threshold PFSS scheme. Then an example was given to demonstrate scheme has effectiveness. Lastly, we respectively construct a (t, p)–threshold multi-server PIR and secure keyword search protocol, and a (t, p)–threshold incremental secret sharing protocol, both based on the proposed (t, p)–PFSS scheme, and simple analysis the correctness and the security of the first protocol.