Cheater identification in (t, n) threshold scheme

  title={Cheater identification in (t, n) threshold scheme},
  author={Kaijun Tan and Hongwen Zhu and S.-J. Gu},
  journal={Computer Communications},
Cheating detection is a very important issue for ( t,n) threshold schemes. An efficient cheater detection scheme based on quadratic residues is proposed in this article. The attack is as difficult as factoring the product of two large prime numbers. It does not need any one-way hash function. The integrity guarantee is given to the public parameters which can prevent a conspirator from falsely accusing any specific members. It can be easily expanded to the multi-secret sharing scheme. The… CONTINUE READING
Highly Cited
This paper has 21 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.


Publications citing this paper.
Showing 1-10 of 12 extracted citations

An Efficient V-Fairness (t, n) Threshold Secret Sharing Scheme

2011 Fifth International Conference on Genetic and Evolutionary Computing • 2011
View 3 Excerpts

An efficient secret sharing scheme whithout any encrypted transmission

2011 International Conference on Electronics, Communications and Control (ICECC) • 2011
View 1 Excerpt

A multi-secret sharing scheme with general access structures based on elliptic curve

2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) • 2010

An Anonymous Multiplexing Communication Protocol Based on IPv6

2010 International Conference on E-Business and E-Government • 2010

A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses

2008 International Symposium on Electronic Commerce and Security • 2008
View 1 Excerpt

A secure and efficient (t, n) multi-secret sharing scheme

Wuhan University Journal of Natural Sciences • 2008


Publications referenced by this paper.
Showing 1-10 of 16 references

Efficient cheater identification method for threshold schemes

C. C. Chang, R. J. Hwang
IEE peoc. E. Comput. Digit. Tech. 144 (1) • 1997
View 4 Excerpts
Highly Influenced

The status of MD5 after a recent attack

H. Dobbertin
CryptoBytes 2 (2) • 1996
View 1 Excerpt

Comment: Multistage secret sharing based on one-way function

L. Harn
Electron. Lett. 31 (4) • 1995

Efficient cheater identification method for threshold schemes , IEE peoc

C. C. Chang, R. J. Hwang
E . Comput . Digit . Tech . • 1995

Multisecret-sharing scheme based on one-way function

J. He, E. Dawson
Electron. Lett. 31 (2) • 1995

Multistage secret sharing based on one-way function

J. He, E. Dawson
Electron. Lett. 31 (19) • 1995

New cheater identification in threshold schemes

S. J. Hwang, C. C. Chang, W. P. Yang
Technical report of the Institute of Computer and Information Science, National Chiao Tung University, Hsinchu, Taiwan, Republic of China • 1995
View 1 Excerpt

Cheating detection and cheater identification in secret sharing schemes , IEE Peoc

T. C. Wu, T. S. Wu
Electron . Lett . • 1994

Rueppel, Message recovery for signature schemes on the discrete logarithm, Pre-proceeding of Eurocrypt’94

R.A.K. Nyberg
Perugia, Italy, • 1994
View 1 Excerpt

A New Signature Scheme Based on the DSA Giving Message Recovery

ACM Conference on Computer and Communications Security • 1993
View 1 Excerpt

Similar Papers

Loading similar papers…