JOURNAL ARTICLE

Verifiable Secret Sharing Scheme Using Hash Values

Abstract

In this paper, we propose a method for secret sharing scheme to identify cheaters and verify reconstructed secret, using hash values calculated following 2×(m + n-k)-regular graph. Our purpose is to solve disadvantages to known previous methods and our contribution is as followings; (i) it can be applied to any secret sharing scheme, and (ii) the size of a share is related only to the number of cheaters that we set, even if the size of secret value increases. As the result, if the number of cheater is less than or equal to the setting number, we can certainly identify a malicious action, and also we can judge whether result of reconstruction is true or false. We conclude that our proposal method is sufficiently practical.

Keywords:
Verifiable secret sharing Secret sharing Hash function Computer science Scheme (mathematics) Theoretical computer science Secure multi-party computation Homomorphic secret sharing Shamir's Secret Sharing Set (abstract data type) Cryptography Algorithm Mathematics Computer security

Metrics

8
Cited By
1.39
FWCI (Field Weighted Citation Impact)
25
Refs
0.84
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Advanced Steganography and Watermarking Techniques
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition

Related Documents

JOURNAL ARTICLE

Efficient verifiable multi-secret sharing scheme based on hash function

Jun Shao

Journal:   Information Sciences Year: 2014 Vol: 278 Pages: 104-109
JOURNAL ARTICLE

A verifiable multi-secret image sharing scheme using XOR operation and hash function

Arup Kumar ChattopadhyayAmitava NagJyoti Prakash SinghAmit Kumar Singh

Journal:   Multimedia Tools and Applications Year: 2020 Vol: 80 (28-29)Pages: 35051-35080
JOURNAL ARTICLE

Unconditionally Secure Verifiable Secret Sharing Scheme

Changlu LinLein Harn

Journal:   INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences Year: 2012 Vol: 4 (17)Pages: 514-518
© 2026 ScienceGate Book Chapters — All rights reserved.