Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme

Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme was presented, in which a malicious broadcast receiver might easily recover old t shares, new share and further reconstruct the secret S. The claimed security could not be realized. In addition, a new protoco...

Full description

Saved in:
Bibliographic Details
Main Authors: XU Jing-fang1, CUI Guo-hua1, CHENG Qi2, ZHANG Zhi1
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2009-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74649449/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537665772552192
author XU Jing-fang1
CUI Guo-hua1
CHENG Qi2
ZHANG Zhi1
author_facet XU Jing-fang1
CUI Guo-hua1
CHENG Qi2
ZHANG Zhi1
author_sort XU Jing-fang1
collection DOAJ
description Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme was presented, in which a malicious broadcast receiver might easily recover old t shares, new share and further reconstruct the secret S. The claimed security could not be realized. In addition, a new protocol was proposed, which elaborately eliminates the defect of previous protocol and improved the efficiency of existing schemes.
format Article
id doaj-art-eb7ce7fb905f40f0af6fb9fa0b4097a7
institution Kabale University
issn 1000-436X
language zho
publishDate 2009-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-eb7ce7fb905f40f0af6fb9fa0b4097a72025-01-14T08:27:44ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-013011812374649449Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing schemeXU Jing-fang1CUI Guo-hua1CHENG Qi2ZHANG Zhi1Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme was presented, in which a malicious broadcast receiver might easily recover old t shares, new share and further reconstruct the secret S. The claimed security could not be realized. In addition, a new protocol was proposed, which elaborately eliminates the defect of previous protocol and improved the efficiency of existing schemes.http://www.joconline.com.cn/zh/article/74649449/secret sharingnew membersecret share recovery
spellingShingle XU Jing-fang1
CUI Guo-hua1
CHENG Qi2
ZHANG Zhi1
Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme
Tongxin xuebao
secret sharing
new member
secret share recovery
title Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme
title_full Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme
title_fullStr Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme
title_full_unstemmed Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme
title_short Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme
title_sort cryptanalysis of a non interactive protocol for member expansion in a secret sharing scheme
topic secret sharing
new member
secret share recovery
url http://www.joconline.com.cn/zh/article/74649449/
work_keys_str_mv AT xujingfang1 cryptanalysisofanoninteractiveprotocolformemberexpansioninasecretsharingscheme
AT cuiguohua1 cryptanalysisofanoninteractiveprotocolformemberexpansioninasecretsharingscheme
AT chengqi2 cryptanalysisofanoninteractiveprotocolformemberexpansioninasecretsharingscheme
AT zhangzhi1 cryptanalysisofanoninteractiveprotocolformemberexpansioninasecretsharingscheme