Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks

Secret sharing is an important aspect of key management in wireless ad hoc and sensor networks. In this paper, we define a new secure model of secret sharing, use the Lagrange interpolation and the bilinear cyclic groups to construct an efficient publicly verifiable secret sharing scheme on the basi...

Full description

Bibliographic Details
Main Authors: Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan, Yixian Yang
Format: Article
Language:English
Published: Hindawi - SAGE Publishing 2013-02-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2013/902462
_version_ 1797723388993601536
author Yuanju Gan
Lihua Wang
Licheng Wang
Ping Pan
Yixian Yang
author_facet Yuanju Gan
Lihua Wang
Licheng Wang
Ping Pan
Yixian Yang
author_sort Yuanju Gan
collection DOAJ
description Secret sharing is an important aspect of key management in wireless ad hoc and sensor networks. In this paper, we define a new secure model of secret sharing, use the Lagrange interpolation and the bilinear cyclic groups to construct an efficient publicly verifiable secret sharing scheme on the basis of this model, and show that this scheme is provably secure against adaptively chosen secret attacks (CSAs) based on the decisional bilinear Diffie-Hellman (DBDH) problem. We find that this scheme has the following properties: (a) point-to-point secure channels are not required in both the secret distribution phase and the secret reconstruction phase; (b) it is a noninteractive secret sharing system in that the participants need not communicate with each other during subshadow verification; and (c) each participant is able to share many secrets with other participants despite holding only one shadow.
first_indexed 2024-03-12T10:01:12Z
format Article
id doaj.art-33b631d3b9b74566b5401f6296ff1e62
institution Directory Open Access Journal
issn 1550-1477
language English
last_indexed 2024-03-12T10:01:12Z
publishDate 2013-02-01
publisher Hindawi - SAGE Publishing
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj.art-33b631d3b9b74566b5401f6296ff1e622023-09-02T11:38:38ZengHindawi - SAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772013-02-01910.1155/2013/902462Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret AttacksYuanju Gan0Lihua Wang1Licheng Wang2Ping Pan3Yixian Yang4 School of Information, Guangdong Ocean University, Zhanjiang, Guangdong 524088, China Network Security Research Institute, National Institute of Information and Communications Technology, 4-2-1 Nukui-Kitamachi, Koganei, Tokyo 184-8795, Japan State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaSecret sharing is an important aspect of key management in wireless ad hoc and sensor networks. In this paper, we define a new secure model of secret sharing, use the Lagrange interpolation and the bilinear cyclic groups to construct an efficient publicly verifiable secret sharing scheme on the basis of this model, and show that this scheme is provably secure against adaptively chosen secret attacks (CSAs) based on the decisional bilinear Diffie-Hellman (DBDH) problem. We find that this scheme has the following properties: (a) point-to-point secure channels are not required in both the secret distribution phase and the secret reconstruction phase; (b) it is a noninteractive secret sharing system in that the participants need not communicate with each other during subshadow verification; and (c) each participant is able to share many secrets with other participants despite holding only one shadow.https://doi.org/10.1155/2013/902462
spellingShingle Yuanju Gan
Lihua Wang
Licheng Wang
Ping Pan
Yixian Yang
Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks
International Journal of Distributed Sensor Networks
title Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks
title_full Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks
title_fullStr Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks
title_full_unstemmed Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks
title_short Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks
title_sort publicly verifiable secret sharing scheme with provable security against chosen secret attacks
url https://doi.org/10.1155/2013/902462
work_keys_str_mv AT yuanjugan publiclyverifiablesecretsharingschemewithprovablesecurityagainstchosensecretattacks
AT lihuawang publiclyverifiablesecretsharingschemewithprovablesecurityagainstchosensecretattacks
AT lichengwang publiclyverifiablesecretsharingschemewithprovablesecurityagainstchosensecretattacks
AT pingpan publiclyverifiablesecretsharingschemewithprovablesecurityagainstchosensecretattacks
AT yixianyang publiclyverifiablesecretsharingschemewithprovablesecurityagainstchosensecretattacks