A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme
Secret sharing has been study for many years and has had a number of real-word applications. There are several methods to construct the secret-sharing schemes. One of them is based on coding theory. In this work, we construct a secret-sharing scheme that realizes an access structure by using linear...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2020-01-01
|
Series: | Complexity |
Online Access: | http://dx.doi.org/10.1155/2020/1784276 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832566273643380736 |
---|---|
author | Ping Li Shengjun Li Hongyang Yan Lishan Ke Teng Huang Alzubair Hassan |
author_facet | Ping Li Shengjun Li Hongyang Yan Lishan Ke Teng Huang Alzubair Hassan |
author_sort | Ping Li |
collection | DOAJ |
description | Secret sharing has been study for many years and has had a number of real-word applications. There are several methods to construct the secret-sharing schemes. One of them is based on coding theory. In this work, we construct a secret-sharing scheme that realizes an access structure by using linear codes, in which any element of the access structure can reconstruct the secret key. We prove that our scheme is a multiprover zero-knowledge proof system in the random oracle model, which shows that a passive adversary gains no information about the secret key. Our scheme is also a leakage-resilient secret-sharing scheme (LRSS) in the bounded-leakage model, which remain provably secure even if the adversary learns a bounded amount of leakage information about their secret key. As an application, we propose a new group identification protocol (GID-scheme) from our LRSS. We prove that our GID-scheme is a leakage-resilient scheme. In our leakage-resilient GID-scheme, the verifier believes the validity of qualified group members and tolerates l bits of adversarial leakage in the distribution protocol, whereas for unqualified group members, the verifier cannot believe their valid identifications in the proof protocol. |
format | Article |
id | doaj-art-4dcef0f628834c3ea48af8f51060fbb0 |
institution | Kabale University |
issn | 1076-2787 1099-0526 |
language | English |
publishDate | 2020-01-01 |
publisher | Wiley |
record_format | Article |
series | Complexity |
spelling | doaj-art-4dcef0f628834c3ea48af8f51060fbb02025-02-03T01:04:39ZengWileyComplexity1076-27871099-05262020-01-01202010.1155/2020/17842761784276A Group Identification Protocol with Leakage Resilience of Secret Sharing SchemePing Li0Shengjun Li1Hongyang Yan2Lishan Ke3Teng Huang4Alzubair Hassan5School of Computer Science, South China Normal University, Guangzhou 510631, ChinaSchool of Information Science and Engineering, Qufu Normal University, Rizhao, ChinaSchool of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou 510006, ChinaSchool of Mathematics and Information Science, Guangzhou University, Guangzhou 510006, ChinaSchool of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou 510006, ChinaSchool of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou 510006, ChinaSecret sharing has been study for many years and has had a number of real-word applications. There are several methods to construct the secret-sharing schemes. One of them is based on coding theory. In this work, we construct a secret-sharing scheme that realizes an access structure by using linear codes, in which any element of the access structure can reconstruct the secret key. We prove that our scheme is a multiprover zero-knowledge proof system in the random oracle model, which shows that a passive adversary gains no information about the secret key. Our scheme is also a leakage-resilient secret-sharing scheme (LRSS) in the bounded-leakage model, which remain provably secure even if the adversary learns a bounded amount of leakage information about their secret key. As an application, we propose a new group identification protocol (GID-scheme) from our LRSS. We prove that our GID-scheme is a leakage-resilient scheme. In our leakage-resilient GID-scheme, the verifier believes the validity of qualified group members and tolerates l bits of adversarial leakage in the distribution protocol, whereas for unqualified group members, the verifier cannot believe their valid identifications in the proof protocol.http://dx.doi.org/10.1155/2020/1784276 |
spellingShingle | Ping Li Shengjun Li Hongyang Yan Lishan Ke Teng Huang Alzubair Hassan A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme Complexity |
title | A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme |
title_full | A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme |
title_fullStr | A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme |
title_full_unstemmed | A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme |
title_short | A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme |
title_sort | group identification protocol with leakage resilience of secret sharing scheme |
url | http://dx.doi.org/10.1155/2020/1784276 |
work_keys_str_mv | AT pingli agroupidentificationprotocolwithleakageresilienceofsecretsharingscheme AT shengjunli agroupidentificationprotocolwithleakageresilienceofsecretsharingscheme AT hongyangyan agroupidentificationprotocolwithleakageresilienceofsecretsharingscheme AT lishanke agroupidentificationprotocolwithleakageresilienceofsecretsharingscheme AT tenghuang agroupidentificationprotocolwithleakageresilienceofsecretsharingscheme AT alzubairhassan agroupidentificationprotocolwithleakageresilienceofsecretsharingscheme AT pingli groupidentificationprotocolwithleakageresilienceofsecretsharingscheme AT shengjunli groupidentificationprotocolwithleakageresilienceofsecretsharingscheme AT hongyangyan groupidentificationprotocolwithleakageresilienceofsecretsharingscheme AT lishanke groupidentificationprotocolwithleakageresilienceofsecretsharingscheme AT tenghuang groupidentificationprotocolwithleakageresilienceofsecretsharingscheme AT alzubairhassan groupidentificationprotocolwithleakageresilienceofsecretsharingscheme |