Abstract
In this paper the Rational Interpolation is presented as a solution to the problem caused by a cheater using the Threshold Scheme. We will implement this scheme by using the Berlekamp-Massey algorithm.
The first version we present does not try to detect the cheaters, as in [3], [9] or [10]. This version tries to prevent their knowledge of the correct keyD while the other participants are aware only of the false keyD′ computed in the threshold scheme.
The second version we present is to detect the existence of cheaters.
Similar content being viewed by others
References
Asmuth, C. and Bloom, J. 1980. A Modular Approach to Key Safeguarding, Math. Dpt., Texas A&M University, College Station, Texas.
Blakely, G.R. 1979. Safeguarding cryptographic keys, NCC 79, AFIPS, 313–317.
Brickell, E.F. and Stinson, D.R. The detection of cheaters in threshold schemes,LNCS. 403, CRYTO'88, Berlin, New York: Springer-Verlag, pp. 564–577.
Davida, G.I., Demilo, R.A. and Lipton, R.J. 1980. Protecting shared cryptographic keys. Proc. 1980 Symp. on Security and Privacy,IEEE Computers Society. 100–102.
McEliece, R.J. and Sarwate, D.V. 1981. On sharing secrets and reed-solomon codes.Comm. of the ACM. 24:583–584.
McEliece, R.J., 1977.The Theory of Information and Coding, Reading, MA: Addison-Wesley.
MacWilliams, F.J. and Sloane, N.J.A. 1983.The Theory of Error Correcting and Codes, North-Holland, Amsterdam, N.Y., Oxford.
Shamir, A. 1979. How to share a secret, comm.ACM, 122:612.
Simmons, G. 1988. An introduction to Shared Secret Schemes and their Applications, Sandia Reports, SAND 88–2298.
Tompa, M. and Woll, H. 1988. How to share a secret with cheaters.J. of Cryptology I. 133–138.
Author information
Authors and Affiliations
Additional information
Communicated by D. Jungnickel
This work was partially supported by Spanish CICYT Grant TIC91-0472.
Rights and permissions
About this article
Cite this article
Rifa-Coma, J. How to avoid the cheaters succeeding in the key sharing scheme. Des Codes Crypt 3, 221–228 (1993). https://doi.org/10.1007/BF01388483
Received:
Revised:
Accepted:
Issue Date:
DOI: https://doi.org/10.1007/BF01388483