Verifiable special threshold secret sharing scheme based on eigenvalue

Utilizing the characteristic that the characteristic equation of the n-th order matrix have multiple roots,the secret distributor distributes two different sub-keys to each participant,and these two sub-keys satisfy two conditions:linear independent and equality of the corresponding characteristic v...

Full description

Saved in:
Bibliographic Details
Main Authors: Yanshuo ZHANG, Wenjing LI, Lei CHEN, Wei BI, Tao YANG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2018-08-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018143/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539451915862016
author Yanshuo ZHANG
Wenjing LI
Lei CHEN
Wei BI
Tao YANG
author_facet Yanshuo ZHANG
Wenjing LI
Lei CHEN
Wei BI
Tao YANG
author_sort Yanshuo ZHANG
collection DOAJ
description Utilizing the characteristic that the characteristic equation of the n-th order matrix have multiple roots,the secret distributor distributes two different sub-keys to each participant,and these two sub-keys satisfy two conditions:linear independent and equality of the corresponding characteristic values.In the process of sub-key distribution and master key recovery,the black box can judge the authenticity of the participants’ activities through the characteristics of the sub-keys.If the two sub-keys have satisfied two conditions of linear independence and equal feature values,it can be determined that the participant’s activity is honest,otherwise,it can be determined that there exists fraudulent activity.The analysis results show that the scheme is correct,secure,and the information rate is 12.
format Article
id doaj-art-b2c1f3fdb8dc4346bc3f1cc49891ab70
institution Kabale University
issn 1000-436X
language zho
publishDate 2018-08-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-b2c1f3fdb8dc4346bc3f1cc49891ab702025-01-14T07:15:22ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-08-013916917559720245Verifiable special threshold secret sharing scheme based on eigenvalueYanshuo ZHANGWenjing LILei CHENWei BITao YANGUtilizing the characteristic that the characteristic equation of the n-th order matrix have multiple roots,the secret distributor distributes two different sub-keys to each participant,and these two sub-keys satisfy two conditions:linear independent and equality of the corresponding characteristic values.In the process of sub-key distribution and master key recovery,the black box can judge the authenticity of the participants’ activities through the characteristics of the sub-keys.If the two sub-keys have satisfied two conditions of linear independence and equal feature values,it can be determined that the participant’s activity is honest,otherwise,it can be determined that there exists fraudulent activity.The analysis results show that the scheme is correct,secure,and the information rate is 12.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018143/secret sharingeigenvalueverifiableblack box
spellingShingle Yanshuo ZHANG
Wenjing LI
Lei CHEN
Wei BI
Tao YANG
Verifiable special threshold secret sharing scheme based on eigenvalue
Tongxin xuebao
secret sharing
eigenvalue
verifiable
black box
title Verifiable special threshold secret sharing scheme based on eigenvalue
title_full Verifiable special threshold secret sharing scheme based on eigenvalue
title_fullStr Verifiable special threshold secret sharing scheme based on eigenvalue
title_full_unstemmed Verifiable special threshold secret sharing scheme based on eigenvalue
title_short Verifiable special threshold secret sharing scheme based on eigenvalue
title_sort verifiable special threshold secret sharing scheme based on eigenvalue
topic secret sharing
eigenvalue
verifiable
black box
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018143/
work_keys_str_mv AT yanshuozhang verifiablespecialthresholdsecretsharingschemebasedoneigenvalue
AT wenjingli verifiablespecialthresholdsecretsharingschemebasedoneigenvalue
AT leichen verifiablespecialthresholdsecretsharingschemebasedoneigenvalue
AT weibi verifiablespecialthresholdsecretsharingschemebasedoneigenvalue
AT taoyang verifiablespecialthresholdsecretsharingschemebasedoneigenvalue