JOURNAL ARTICLE

INFORMATION-THEORETICALLY SECURE STRONG VERIFIABLE SECRET SHARING

Abstract

In a (t,n) secret sharing scheme, a mutually trusted dealer divides a secret into n shares in such a way that any t or more than t shares can reconstruct the secret, but fewer than t shares cannot reconstruct the secret. When there is no mutually trusted dealer, a (n,t,n) secret sharing scheme can be used to set up a (t,n) secret sharing because each shareholder also acts as a dealer to decide a master secret jointly and divide each selected secret for others. A verifiable secret sharing (VSS) allows each shareholder to verify that all shares are t-consistent (i.e. every subset of t of the n shares defines the same secret). In this paper, we show that (t,n)-VSS and (n,t,n)-VSS proposed by Pedersen can only ensure that all shares are t-consistent; but shares may not satisfy the security requirements of secret sharing scheme. Then, we introduce a new notion of strong VSS. A strong VSS scheme can ensure that (a) all shares are t-consistent, and (b) all shares satisfy the security requirements of secret sharing scheme. We propose two simple ways to convert Pedersen’s VSS schemes into strong VSS schemes, which are information-theoretically secure. We also prove that our proposed VSS schemes satisfy the strong verifiable property.

Keywords:
Verifiable secret sharing Secret sharing Homomorphic secret sharing Shamir's Secret Sharing Computer science Computer security Secure multi-party computation Access structure Scheme (mathematics) Simple (philosophy) Set (abstract data type) Mathematics Cryptography

Metrics

2
Cited By
0.38
FWCI (Field Weighted Citation Impact)
12
Refs
0.75
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Privacy-Preserving Technologies in Data
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Polynomial Differential-Based Information-Theoretically Secure Verifiable Secret Sharing

Qassim Al Mahmoud

Journal:   International Journal of Information Technology and Computer Science Year: 2014 Vol: 6 (12)Pages: 18-23
JOURNAL ARTICLE

Information-theoretically Secure Timed-release Secret Sharing Schemes

Yohei WatanabeJunji Shikata

Journal:   Journal of Information Processing Year: 2016 Vol: 24 (4)Pages: 680-689
JOURNAL ARTICLE

Information-theoretic secure verifiable secret sharing over RSA modulus

Gang QiuHong WangShimin WeiXiao Guo-zhen

Journal:   Wuhan University Journal of Natural Sciences Year: 2006 Vol: 11 (6)Pages: 1849-1852
BOOK-CHAPTER

Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing

Torben Pryds Pedersen

Lecture notes in computer science Year: 2007 Pages: 129-140
© 2026 ScienceGate Book Chapters — All rights reserved.