Computer Science – Cryptography and Security
Scientific paper
2012-03-16
Computer Science
Cryptography and Security
10 pages, Proceedings of the Proceedings of the 10th National Workshop on Cryptology, Cryptology Research Society of India and
Scientific paper
Threshold secret sharing schemes do not prevent any malicious behavior of the dealer or shareholders and so we need verifiable secret sharing, to detect and identify the cheaters, to achieve fair reconstruction of a secret. The problem of verifiable secret sharing is to verify the shares distributed by the dealer. A novel approach for verifiable secret sharing is presented in this paper where both the dealer and shareholders are not assumed to be honest. In this paper, we extend the term verifiable secret sharing to verify the shares, distributed by a dealer as well as shares submitted by shareholders for secret reconstruction, and to verify the reconstructed secret. Our proposed scheme uses a one way hash function and probabilistic homomorphic encryption function to provide verifiability and fair reconstruction of a secret.
Jinwala Devesh
Parmar Keyur
No associations
LandOfFree
A Novel Approach for Verifiable Secret Sharing by using a One Way Hash Function does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with A Novel Approach for Verifiable Secret Sharing by using a One Way Hash Function, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and A Novel Approach for Verifiable Secret Sharing by using a One Way Hash Function will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-349399