Skip to main content

Multipartite Verifiable Secret Sharing Based on CRT

  • Conference paper
  • First Online:
Computer Networks and Inventive Communication Technologies

Abstract

In (tn) threshold secret sharing scheme, the dealer distributes secret among a group of n participants, and any t threshold number of participants can reconstruct the secret. However, \(t-1\) or lesser number of participants can not retrieve the secret. In verifiable secret sharing schemes (VSSS), participants can verify their share after receiving shares from the dealer to ensure that a dealer is not malicious. In multipartite secret sharing based on CRT scheme, a set of participants is divided into disjoint partitions, and whatever action performed at a single level is repeated at all other partitions. However, till date there is no mechanism to verify if dealer is malicious or not in multipartite secret sharing based on CRT. Two schemes are proposed for verification of a dealer, namely multipartite verifiable secret sharing based on CRT by using Iften, and multipartite verifiable secret sharing-based CRT by using kameer Kaya. Both proposed schemes are perfectly secure, and the security of both the schemes dependent on discrete logarithm problem.

Supported by organization x.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  2. Blakley, G.R.: Safeguarding cryptographic keys. In: International Workshop on Managing Requirements Knowledge. IEEE Computer Society (1979)

    Google Scholar 

  3. Benaloh, J.C.: Secret sharing homomorphisms: Keeping shares of a secret secret. In: Conference on the Theory and Application of Cryptographic Techniques. Springer, Berlin, Heidelberg (1986)

    Google Scholar 

  4. Feldman, P.: A practical scheme for non-interactive verifiable secret sharing. In: 28th Annual Symposium on Foundations of Computer Science (SFCS), pp. 427–438. IEEE (1987)

    Google Scholar 

  5. Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Annual International Cryptology Conference. Springer, Berlin, Heidelberg (1991)

    Google Scholar 

  6. Stinson, D.R., Wei, R.: Unconditionally secure proactive secret sharing scheme with combinatorial structures. In: International Workshop on Selected Areas in Cryptography, Springer, Berlin, Heidelberg (1999)

    Google Scholar 

  7. Patra, A., Choudhary, A., Pandu Rangan, C.: Efficient statistical asynchronous verifiable secret sharing with optimal resilience. In: International Conference on Information Theoretic Security. Springer, Berlin, Heidelberg (2009)

    Google Scholar 

  8. Lin, C., Harn, L.: Unconditionally secure verifiable secret sharing scheme. AISS Adv. Inf. Sci. Service Sci. 4(17), 514–518 (2012)

    Google Scholar 

  9. Iftene, S.: Secret sharing schemes with applications in security protocols. Sci. Ann. Cuza Univ. 16, 63–96 (2006)

    Google Scholar 

  10. Qiong, L., et al.: A non-interactive modular verifiable secret sharing scheme. In: Proceedings. International Conference on Communications, Circuits and Systems, vol. 1. IEEE (2005)

    Google Scholar 

  11. Kaya, K., Selçuk, A.A.: A verifiable secret sharing scheme based on the Chinese remainder theorem. International Conference on Cryptology in India. Springer, Berlin, Heidelberg (2008)

    Google Scholar 

  12. Hsu, C.-F., Harn, L.: Multipartite secret sharing based on CRT. Wireless Pers. Commun. 78(1), 271–282 (2014)

    Google Scholar 

  13. Farrs, O., Jaume, M., Padr, C.: Ideal multipartite secret sharing schemes. J. Cryptol. 25(3), 434–463 (2012)

    Google Scholar 

  14. Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. Inf. Theory 29(2), 208–210 (1983)

    Article  MathSciNet  Google Scholar 

  15. Boudot, F.: Efficient proofs that a committed number lies in an interval. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Subrahmanyam, R., Rukma Rekha, N., Subba Rao, Y.V. (2022). Multipartite Verifiable Secret Sharing Based on CRT. In: Smys, S., Bestak, R., Palanisamy, R., Kotuliak, I. (eds) Computer Networks and Inventive Communication Technologies . Lecture Notes on Data Engineering and Communications Technologies, vol 75. Springer, Singapore. https://doi.org/10.1007/978-981-16-3728-5_17

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-3728-5_17

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-3727-8

  • Online ISBN: 978-981-16-3728-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics