JOURNAL ARTICLE

A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction

Changlu LinHuidan HuChin‐Chen ChangShaohua Tang

Year: 2018 Journal:   IEEE Access Vol: 6 Pages: 70666-70673   Publisher: Institute of Electrical and Electronics Engineers

Abstract

A publicly verifiable secret sharing (PVSS) scheme enjoys the public verification and the lower cost of communication than VSS scheme. However, the existing PVSS schemes cannot be applied in the scenarios of the devices with low computation ability and do not share the multiple secrets among all participants efficiently. In this paper, an efficient publicly verifiable multi-secret sharing scheme with outsourcing secret reconstruction is proposed. Each participant only spends a small amount of computational cost to recover multiple secrets because of the expensive burden of computation and verifiability is outsourced to the cloud service provider (CSP). Moreover, the CSP knows no information of the secrets, and the participants have the abilities to verify the returned result. We also prove that our scheme is secure under the hardness assumption of the discrete logarithm problem and the modified generalized bilinear inversion problem.

Keywords:
Verifiable secret sharing Secret sharing Secure multi-party computation Computer science Outsourcing Scheme (mathematics) Discrete logarithm Computer security Shamir's Secret Sharing Homomorphic secret sharing Cloud computing Bilinear interpolation Computation Theoretical computer science Cryptography Encryption Public-key cryptography Algorithm Mathematics Law

Metrics

14
Cited By
1.59
FWCI (Field Weighted Citation Impact)
35
Refs
0.86
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Privacy-Preserving Technologies in Data
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Publicly verifiable multi‐secret sharing scheme from bilinear pairings

Tsu‐Yang WuYuh‐Min Tseng

Journal:   IET Information Security Year: 2013 Vol: 7 (3)Pages: 239-246
BOOK-CHAPTER

Publicly Verifiable Secret Sharing

Markus Stadler

Lecture notes in computer science Year: 1996 Pages: 190-199
JOURNAL ARTICLE

Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks

Yuanju GanLihua WangLicheng WangPing PanYixian Yang

Journal:   International Journal of Distributed Sensor Networks Year: 2013 Vol: 9 (2)Pages: 902462-902462
JOURNAL ARTICLE

A (n,t,n) Verifiable Multi-secret Sharing Scheme with Secure Secret Reconstruction

Meng LiShaoyun QuTiantian XunJia Yu

Journal:   International Journal of Security and Its Applications Year: 2015 Vol: 9 (1)Pages: 191-204
© 2026 ScienceGate Book Chapters — All rights reserved.