2012
DOI: 10.4304/jnw.7.4.738-745
|View full text |Cite
|
Sign up to set email alerts
|

Rational Multi-Secret Sharing Scheme Based On Bit Commitment Protocol

Abstract: In this paper we mainly focus on the fraud problem among the players and the shortcomings of multi-secret sharing existed in rational secret sharing schemes. Based on the exited schemes and the related knowledge such as bit commitment agreement, we proposed a new rational multi-secret sharing scheme that has high security. In our scheme, we take an identity authentication for the dealer in distribution phase. Players can verify the correctness of the identity of the dealer. In this way, it is feasible to preve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…Training data set includes 12000 records, while validation data set includes 8000 records. Furthermore, each record includes 98 variables, 44 variables reflect the customer investment behavior and the rest are social statistics variables [14][15].…”
Section: B Variable Selectionmentioning
confidence: 99%
“…Training data set includes 12000 records, while validation data set includes 8000 records. Furthermore, each record includes 98 variables, 44 variables reflect the customer investment behavior and the rest are social statistics variables [14][15].…”
Section: B Variable Selectionmentioning
confidence: 99%
“…It has affected many areas such as machine learning, optimization problems, material synthesis, and communication systems [1]- [4]. In communication systems, Bit commitment (BC) is the basic building block of many cryptographic protocols, for instance, it is widely used in multi-party-based secure computations such as verified secret sharing schemes [5]. It is used in the access control of cloud computing as it preserves the users' privacy and provides a robust hiding access control policy [6].…”
Section: Introductionmentioning
confidence: 99%
“…Shamir's scheme was based on the Lagrange interpolating polynomial [1], while Blakley's scheme was based on linear projective geometry [2]. Subsequently, secret sharing becomes an important research field of modern cryptography and information security, a lot of researches have been proposed [3][4][5][6][7]. Secret sharing can prevent the abuse of power, therefore, it is applied to realize the trust recommendation of trust management in the mobile Ad hoc networks (MANETs) [8].…”
Section: Introductionmentioning
confidence: 99%