Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme
Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme was presented, in which a malicious broadcast receiver might easily recover old t shares, new share and further reconstruct the secret S. The claimed security could not be realized. In addition, a new protoco...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2009-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74649449/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537665772552192 |
---|---|
author | XU Jing-fang1 CUI Guo-hua1 CHENG Qi2 ZHANG Zhi1 |
author_facet | XU Jing-fang1 CUI Guo-hua1 CHENG Qi2 ZHANG Zhi1 |
author_sort | XU Jing-fang1 |
collection | DOAJ |
description | Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme was presented, in which a malicious broadcast receiver might easily recover old t shares, new share and further reconstruct the secret S. The claimed security could not be realized. In addition, a new protocol was proposed, which elaborately eliminates the defect of previous protocol and improved the efficiency of existing schemes. |
format | Article |
id | doaj-art-eb7ce7fb905f40f0af6fb9fa0b4097a7 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2009-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-eb7ce7fb905f40f0af6fb9fa0b4097a72025-01-14T08:27:44ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-013011812374649449Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing schemeXU Jing-fang1CUI Guo-hua1CHENG Qi2ZHANG Zhi1Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme was presented, in which a malicious broadcast receiver might easily recover old t shares, new share and further reconstruct the secret S. The claimed security could not be realized. In addition, a new protocol was proposed, which elaborately eliminates the defect of previous protocol and improved the efficiency of existing schemes.http://www.joconline.com.cn/zh/article/74649449/secret sharingnew membersecret share recovery |
spellingShingle | XU Jing-fang1 CUI Guo-hua1 CHENG Qi2 ZHANG Zhi1 Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme Tongxin xuebao secret sharing new member secret share recovery |
title | Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme |
title_full | Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme |
title_fullStr | Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme |
title_full_unstemmed | Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme |
title_short | Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme |
title_sort | cryptanalysis of a non interactive protocol for member expansion in a secret sharing scheme |
topic | secret sharing new member secret share recovery |
url | http://www.joconline.com.cn/zh/article/74649449/ |
work_keys_str_mv | AT xujingfang1 cryptanalysisofanoninteractiveprotocolformemberexpansioninasecretsharingscheme AT cuiguohua1 cryptanalysisofanoninteractiveprotocolformemberexpansioninasecretsharingscheme AT chengqi2 cryptanalysisofanoninteractiveprotocolformemberexpansioninasecretsharingscheme AT zhangzhi1 cryptanalysisofanoninteractiveprotocolformemberexpansioninasecretsharingscheme |