Journal of the Belarusian State University. Mathematics and Informatics
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Guidelines for authors

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Journal of the Belarusian State University. Mathematics and Informatics:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Journal of the Belarusian State University. Mathematics and Informatics, 2018, Volume 2, Pages 4–9 (Mi bgumi1)  

This article is cited in 2 scientific papers (total in 2 papers)

Geometry and Algebra

Perfect verification of modular scheme

G. V. Matveev, V. V. Matulis

Belarusian State University, 4 Niezaliežnasci Avenue, Minsk 220030, Belarus
Full-text PDF (397 kB) Citations (2)
References:
Abstract: Secret sharing schemes are used to distribute a secret value among a group of users so that only authorized set of them can reconstruct the original secret correctly. The modular secret sharing scheme (MSSS) we are studying is based on the Chinese Remainder Theorem. In this scheme the secrets $s(x), S(x), s_{1}(x),\dots , s_{k}(x)$ are defined as follows $s(x)=S(x) ~mod\, m(x), s_{i}(x)=S(x) ~mod\, m_{i}(x), i=1,2,\dots , k$. All the secrets and moduli are chosen from polynomial ring $F_{p}[x]$, and the reconstruction of secret $s(x)$ is carried out by applying the above-mentioned Chinese Remainder Theorem. The verification of any secret sharing scheme is understood as the protocol of verification by the participants of their partial secrets and (or) the protocol for verifying the legitimacy of the actions of the dealer. In this paper, we introduce a perfect verification protocol of MSSS. It means that none information leaks under distribution and verification. Two verification protocols are introduced in this paper. The first one is simpler and it depends on assumption about dealer honesty. If there is no such assumption verification is more complex. Both protocols are based on one work by J. Benalo and generalize the protocol proposed earlier by M. Vaskovsky and G. Matveev in two ways. First, the general, not only the threshold access structure is verified, and secondly, the dealer is not necessarily honest. Earlier, N. Shenets found the perfection condition of MSSS. Thus, if these conditions аre met, both the MSSS and its verification protocol are perfect.
Keywords: polynomial modular scheme, secret sharing, verification, secret, partial secret, finite field.
Received: 15.12.2017
Document Type: Article
UDC: 519.719.2
Language: Russian
Citation: G. V. Matveev, V. V. Matulis, “Perfect verification of modular scheme”, Journal of the Belarusian State University. Mathematics and Informatics, 2 (2018), 4–9
Citation in format AMSBIB
\Bibitem{MatMat18}
\by G.~V.~Matveev, V.~V.~Matulis
\paper Perfect verification of modular scheme
\jour Journal of the Belarusian State University. Mathematics and Informatics
\yr 2018
\vol 2
\pages 4--9
\mathnet{http://mi.mathnet.ru/bgumi1}
Linking options:
  • https://www.mathnet.ru/eng/bgumi1
  • https://www.mathnet.ru/eng/bgumi/v2/p4
  • This publication is cited in the following 2 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Journal of the Belarusian State University. Mathematics and Informatics
    Statistics & downloads:
    Abstract page:77
    Full-text PDF :29
    References:22
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024