2011 Fifth International Conference on Genetic and Evolutionary Computing 2011
DOI: 10.1109/icgec.2011.97
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient V-Fairness (t, n) Threshold Secret Sharing Scheme

Abstract: Lee and Laih proposed a v-fairness (t, n) secret sharing scheme such that the participants can recover a secret without providing their shadows simultaneously. Besides, the honest participants can obtain the secret even if there are v cheaters among the t participants in their scheme, where v Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…In their scheme, the dealer divides the secret into multiple subsecrets with different threshold values and generates shares for each sub-secret. There are some recent papers (Lee, 2011;Yang et al, 2011) to improve Laih et al's scheme. One main problem of the V-fairness (t, n) secret reconstruction scheme is that the number of cheaters in this model is limited to be less than t/2.…”
Section: Related Work On Fair Reconstruction Of the Secretmentioning
confidence: 97%
“…In their scheme, the dealer divides the secret into multiple subsecrets with different threshold values and generates shares for each sub-secret. There are some recent papers (Lee, 2011;Yang et al, 2011) to improve Laih et al's scheme. One main problem of the V-fairness (t, n) secret reconstruction scheme is that the number of cheaters in this model is limited to be less than t/2.…”
Section: Related Work On Fair Reconstruction Of the Secretmentioning
confidence: 97%
“…Laih and Lee [2] proposed a vfair (t, n)-threshold secret sharing scheme, in which all participants do not have to show their secret shares simultaneously to recover the secret with the same probability, even if there are v(< t/2) dishonest participants. [3] and [5] further improved Laih scheme [2]. In 2003, Tian [6] utilized the consistency of secret shares to detect attackers, and constructed a fair (t, n)-threshold scheme with the help of the schemes of Tompa and Woll [7].…”
Section: Introductionmentioning
confidence: 99%