JOURNAL ARTICLE

Verifiable Rational Secret Sharing Scheme in Mobile Networks

Zhang EnPeiyan YuanJiao Du

Year: 2015 Journal:   Mobile Information Systems Vol: 2015 Pages: 1-7   Publisher: IOS Press

Abstract

With the development of mobile network, lots of people now have access to mobile phones and the mobile networks give users ubiquitous connectivity. However, smart phones and tablets are poor in computational resources such as memory size, processor speed, and disk capacity. So far, all existing rational secret sharing schemes cannot be suitable for mobile networks. In this paper, we propose a verifiable rational secret sharing scheme in mobile networks. The scheme provides a noninteractively verifiable proof for the correctness of participants’ share and handshake protocol is not necessary; there is no need for certificate generation, propagation, and storage in the scheme, which is more suitable for devices with limited size and processing power; in the scheme, every participant uses her encryption on number of each round as the secret share and the dealer does not have to distribute any secret share; every participant cannot gain more by deviating the protocol, so rational participant has an incentive to abide by the protocol; finally, every participant can obtain the secret fairly (means that either everyone receives the secret, or else no one does) in mobile networks. The scheme is coalition-resilient and the security of our scheme relies on a computational assumption.

Keywords:
Verifiable secret sharing Computer science Secret sharing Computer security Scheme (mathematics) Correctness Computer network Protocol (science) Encryption Mobile device Cryptography World Wide Web Set (abstract data type) Algorithm

Metrics

9
Cited By
1.57
FWCI (Field Weighted Citation Impact)
33
Refs
0.91
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Privacy-Preserving Technologies in Data
Physical Sciences →  Computer Science →  Artificial Intelligence
Blockchain Technology Applications and Security
Physical Sciences →  Computer Science →  Information Systems

Related Documents

BOOK-CHAPTER

Verifiable Rational Multi-secret Sharing Scheme

Yongquan CaiZhanhai LuoYi Yang

Communications in computer and information science Year: 2011 Pages: 42-48
JOURNAL ARTICLE

Publicly Verifiable Rational Secret Sharing

Yongquan CaiZhanhai LuoYi Yang

Journal:   International Journal of Advancements in Computing Technology Year: 2011 Vol: 3 (9)Pages: 1-8
JOURNAL ARTICLE

Verifiable rational secret sharing scheme based on Chinese remainder theorem

Liyuan ZhangEn Zhang

Journal:   Journal of Computer Applications Year: 2013 Vol: 32 (11)Pages: 3143-3146
JOURNAL ARTICLE

Unconditionally Secure Verifiable Secret Sharing Scheme

Changlu LinLein Harn

Journal:   INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences Year: 2012 Vol: 4 (17)Pages: 514-518
JOURNAL ARTICLE

Special Publicly Verifiable Secret Sharing Scheme for LEO Satellite Networks

Liu XiaoyueYouliang TianJianfeng MaZhu Xiao

Journal:   International Journal of Digital Content Technology and its Applications Year: 2011 Vol: 5 (11)Pages: 378-384
© 2026 ScienceGate Book Chapters — All rights reserved.