A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters

  • Raylin Tso
  • Ying Miao
  • Eiji Okamoto
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2971)

Abstract

In a (k,n) Shamir’s threshold scheme, if one or more of the n shares are fake, then the secret may not be reconstructed correctly by some sets of k shares. Supposing that at most t of the n shares are fake, Rees et al. (1999) described two algorithms to determine consistent sets of shares so that the secret can be reconstructed correctly from k shares in any of these consistent sets. In their algorithms, no honest participant can be absent and at least n-t shares should be pooled during the secret reconstruction phase. In this paper, we propose a modified algorithm for this problem so that the number of participants taking part in the secret reconstruction can be reduced to k+2t and the shares need to be pooled can be reduced to, in the best case, k+t, and less than or equal to k+2t in the others. Its efficiency is also investigated.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Blakley, G.R.: Safeguarding cryptographic keys. In: AFIPS Conf. Proceed., vol. 48, pp. 313–317 (1979)Google Scholar
  2. 2.
    Brickell, E.F., Stinson, D.R.: The detection of cheaters in threshold schemes. SIAM J. Discrete Math. 4, 502–510 (1991)MATHCrossRefMathSciNetGoogle Scholar
  3. 3.
    Harn, L.: Efficient sharing (broadcasting) of multiple secrets. IEE Proc. -Comput. Digit. Tech. 142, 237–240 (1995)CrossRefGoogle Scholar
  4. 4.
    McEliece, R.J., Sarwate, D.V.: On sharing secrets and Reed-Solomon codes. Comm. ACM 24, 583–584 (1981)CrossRefMathSciNetGoogle Scholar
  5. 5.
    Ogata, W., Kurosawa, K.: Optimum secret sharing scheme secure against cheating. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 200–211. Springer, Heidelberg (1996)Google Scholar
  6. 6.
    Rees, R.S., Stinson, D.R., Wei, R., van Rees, G.H.J.: An application of covering designs: determining the maximum consistent set of shares in a threshold scheme. Ars Combin. 53, 225–237 (1999)MATHMathSciNetGoogle Scholar
  7. 7.
    Shamir, A.: How to share a secret. Comm. ACM 22, 612–613 (1979)MATHCrossRefMathSciNetGoogle Scholar
  8. 8.
    Tompa, M., Woll, H.: How to share a secret with cheaters. J. Cryptology 1, 133–138 (1988)MATHCrossRefMathSciNetGoogle Scholar
  9. 9.

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Raylin Tso
    • 1
  • Ying Miao
    • 2
  • Eiji Okamoto
    • 3
  1. 1.Risk Engineering Major Graduate School of Systems and Information EngineeringUniversity of TsukubaTsukubaJapan
  2. 2.Institute of Policy and Planning SciencesUniversity of TsukubaTsukubaJapan
  3. 3.Institute of Information Sciences and ElectronicsUniversity of TsukubaTsukubaJapan

Personalised recommendations