A Cellular Automata Based Verifiable Multi-secret Sharing Scheme Without a Trusted Dealer

We proposed a verifiable multi-secret sharing scheme without a dealer.We use cellular automata,having the properties of linear computations and parallel computations,to construct our scheme.The linear computational property makes it possible to build a scheme without the assistance of a trusted deal...

Full description

Saved in:
Bibliographic Details
Published inChinese Journal of Electronics Vol. 26; no. 2; pp. 313 - 318
Main Authors Li, Meng, Yu, Jia, Hao, Rong
Format Journal Article
LanguageEnglish
Published Published by the IET on behalf of the CIE 01.03.2017
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:We proposed a verifiable multi-secret sharing scheme without a dealer.We use cellular automata,having the properties of linear computations and parallel computations,to construct our scheme.The linear computational property makes it possible to build a scheme without the assistance of a trusted dealer,and the parallel computational property contributes to the high efficiency of the scheme.Hash function is used to realize the verification of shares,which also makes our scheme more efficient.The security of the scheme is also analyzed.
Bibliography:Multi-secret sharing Verifiability Trusted dealer Cellular automata Hash function
We proposed a verifiable multi-secret sharing scheme without a dealer.We use cellular automata,having the properties of linear computations and parallel computations,to construct our scheme.The linear computational property makes it possible to build a scheme without the assistance of a trusted dealer,and the parallel computational property contributes to the high efficiency of the scheme.Hash function is used to realize the verification of shares,which also makes our scheme more efficient.The security of the scheme is also analyzed.
10-1284/TN
ISSN:1022-4653
2075-5597
DOI:10.1049/cje.2017.01.026