2014
DOI: 10.1049/iet-ifs.2012.0381
|View full text |Cite
|
Sign up to set email alerts
|

Generalised cheater detection and identification

Abstract: Cheater detection and identification are important issues in the process of secret reconstruction. To detect and identify cheaters most of the algorithms need the dealer to generate and distribute additional information to shareholders. Recently, algorithms have been proposed to detect and identify cheaters. If more than t (i.e. the threshold) shares, for example j (i.e. t < j) shares in the secret reconstruction, then redundancy of shares can be used to detect and identify cheaters. The detectability and iden… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 29 publications
0
4
0
Order By: Relevance
“…The benefits of multiparty computing and function sharing have been investigated [ 23 , 24 ]. The techniques may identify harmful users’ cheating behavior during secret reconstruction, so an honest user cannot be misled.…”
Section: Related Workmentioning
confidence: 99%
“…The benefits of multiparty computing and function sharing have been investigated [ 23 , 24 ]. The techniques may identify harmful users’ cheating behavior during secret reconstruction, so an honest user cannot be misled.…”
Section: Related Workmentioning
confidence: 99%
“…Other solutions for the detection of data leaks comprise of network‐based data leak detection solution [19, 20 ], secret sharing‐based cheater detection and identification [21 ], and classification technique [22 ]. To ensure when the confidential data is being leaked, a network‐wide technique based on black‐box differencing is proposed by Croft and Caesar in [20 ], which controlled and restricted the secret data flow within a network.…”
Section: Introductionmentioning
confidence: 99%
“…Apart from cheating detection, there are schemes that identify cheaters in [15][16][17][18][19][20]. These schemes provide the method of identifying any forged share once it has been detected that cheating takes place.…”
Section: Introductionmentioning
confidence: 99%