DOI QR코드

DOI QR Code

Secure and Efficient Secret Sharing Scheme Based on Wide Pipe Hash Function

광역 파이프 해쉬 함수에 기반한 안전하고 효율적인 비밀분산

  • 김희도 (강릉영동대학 부사관과) ;
  • 원동호 (성균관대학교 정보통신공학부)
  • Published : 2006.12.31

Abstract

In this paper, we propose a secure and efficient secret sharing scheme Based on wide pipe hash function This scheme provides the property to share multiple secrets and allows participants to be added/deleted dynamically, without haying to redistribute new secret shares. Proposed scheme has advantage to detect cheating and identify of all cheater, regardless of their number. Futhermore, it is more secure and efficient than previous schemes based on hash function.

References

  1. G. R. Blakely, 'Safeguarding cryptographic key,' In proceeding of AFIPS National Computer Conference, pp.313-317, 1979
  2. AdiShamir, How to share a secret, Communication of the ACM, 21 : 120-126. 1979 https://doi.org/10.1145/359168.359176
  3. C. Cacjom, 'On-line secret sharing.' In C. boyd, editor, Proceeding of the 5th IMA conference on Cryptography and Coding, pp.190-198. Springer-Verlag, 1995
  4. Soo-Hyun Oh, Seung-Joo Kim, Dong-Ho Won, Efficient On-line Sharing Scheme based on One-way Hash Function. The transaction of the Korea Information Processing Society, Vol.7-C NO.10, pp.3128-3137, October, 2000
  5. O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority, in Proc. 19th ACM Symposium on Theorem Computing pp.218-229, 1987
  6. R. G. E. Pinch, On-line multiple secret sharing, Electronic Letters. 32(12) : 1087-1088, 1996 https://doi.org/10.1049/el:19960692
  7. H. Ghodosi, J. Pieprzyk, G.R. Chaudhrt, J. Seberry, How to pervent cheating in Pinch's scheme, Electronic Letters. 33(17) : 1453-1454, 1997 https://doi.org/10.1049/el:19970980
  8. Chan Yeob Yeun, Chris J. Mitchell, Mike Burmester, An Online Secret Sharing Scheme which Identifies All Cheater, Proc. of NORDSEC 98. The Third Noridic Workshop on Information Security Singapore, Dec., 1998
  9. Stefan Lucks, A Failure-Friendly Design Principle for Hash Functions, ASICRYPT 2005, LNCS 3788, pp.474C 494, 2005 https://doi.org/10.1007/11593447_26