Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices  

在线阅读下载全文

作  者:En Zhang Xintao Duan Siuming Yiu Junbin Fang Zoe L.Jiang Tsz HonYuen Jie Peng 

机构地区:[1]College of Computer and Information Engineering,Henan Normal University,Xinxiang,453007,China [2]Lab of Intelligence Business&Internet of Things of Henan Province,Xinxiang,453007,China [3]Department of Computer Science,University of Hong Kong,Hong Kong,China [4]Department of Optoelectronic Engineering,Jinan University,Guangzhou,510632,China [5]School of Computer Science and Technology,Harbin nstitute of Technology Shenzhen Graduate School,Shenzhen,518055,China [6]Huawei,Singapore

出  处:《Computers, Materials & Continua》2018年第9期401-414,共14页计算机、材料和连续体(英文)

基  金:This work was supported by the National Natural Science Foundation of China(U1604156,61602158,61772176);Science and Technology Research Project of Henan Province(172102210045).

摘  要:In the setting of(t,n)threshold secret sharing,at least t parties can reconstruct the secret,and fewer than t parties learn nothing about the secret.However,to achieve fairness,the existing secret sharing schemes either assume a trusted party exists or require running multi-round,which is not practical in a real application.In addition,the cost of verification grows dramatically with the number of participants and the communication complexity is O(t),if there is not a trusted combiner in the reconstruction phase.In this work,we propose a fair server-aided multi-secret sharing scheme for weak computational devices.The malicious behavior of clients or server providers in the scheme can be verified,and the server provider learns nothing about the secret shadows and the secrets.Unlike other secret sharing schemes,our scheme does not require interaction among users and can work in asynchronous mode,which is suitable for mobile networks or cloud computing environments since weak computational mobile devices are not always online.Moreover,in the scheme,the secret shadow is reusable,and expensive computation such as reconstruction computation and homomorphic verification computation can be outsourced to the server provider,and the users only require a small amount of computation.

关 键 词:SECRET SHARING server-aided NON-INTERACTIVE FAIRNESS 

分 类 号:TP3[自动化与计算机技术—计算机科学与技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象