A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme

Secret sharing has been study for many years and has had a number of real-word applications. There are several methods to construct the secret-sharing schemes. One of them is based on coding theory. In this work, we construct a secret-sharing scheme that realizes an access structure by using linear...

Full description

Saved in:
Bibliographic Details
Main Authors: Ping Li, Shengjun Li, Hongyang Yan, Lishan Ke, Teng Huang, Alzubair Hassan
Format: Article
Language:English
Published: Wiley 2020-01-01
Series:Complexity
Online Access:http://dx.doi.org/10.1155/2020/1784276
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832566273643380736
author Ping Li
Shengjun Li
Hongyang Yan
Lishan Ke
Teng Huang
Alzubair Hassan
author_facet Ping Li
Shengjun Li
Hongyang Yan
Lishan Ke
Teng Huang
Alzubair Hassan
author_sort Ping Li
collection DOAJ
description Secret sharing has been study for many years and has had a number of real-word applications. There are several methods to construct the secret-sharing schemes. One of them is based on coding theory. In this work, we construct a secret-sharing scheme that realizes an access structure by using linear codes, in which any element of the access structure can reconstruct the secret key. We prove that our scheme is a multiprover zero-knowledge proof system in the random oracle model, which shows that a passive adversary gains no information about the secret key. Our scheme is also a leakage-resilient secret-sharing scheme (LRSS) in the bounded-leakage model, which remain provably secure even if the adversary learns a bounded amount of leakage information about their secret key. As an application, we propose a new group identification protocol (GID-scheme) from our LRSS. We prove that our GID-scheme is a leakage-resilient scheme. In our leakage-resilient GID-scheme, the verifier believes the validity of qualified group members and tolerates l bits of adversarial leakage in the distribution protocol, whereas for unqualified group members, the verifier cannot believe their valid identifications in the proof protocol.
format Article
id doaj-art-4dcef0f628834c3ea48af8f51060fbb0
institution Kabale University
issn 1076-2787
1099-0526
language English
publishDate 2020-01-01
publisher Wiley
record_format Article
series Complexity
spelling doaj-art-4dcef0f628834c3ea48af8f51060fbb02025-02-03T01:04:39ZengWileyComplexity1076-27871099-05262020-01-01202010.1155/2020/17842761784276A Group Identification Protocol with Leakage Resilience of Secret Sharing SchemePing Li0Shengjun Li1Hongyang Yan2Lishan Ke3Teng Huang4Alzubair Hassan5School of Computer Science, South China Normal University, Guangzhou 510631, ChinaSchool of Information Science and Engineering, Qufu Normal University, Rizhao, ChinaSchool of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou 510006, ChinaSchool of Mathematics and Information Science, Guangzhou University, Guangzhou 510006, ChinaSchool of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou 510006, ChinaSchool of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou 510006, ChinaSecret sharing has been study for many years and has had a number of real-word applications. There are several methods to construct the secret-sharing schemes. One of them is based on coding theory. In this work, we construct a secret-sharing scheme that realizes an access structure by using linear codes, in which any element of the access structure can reconstruct the secret key. We prove that our scheme is a multiprover zero-knowledge proof system in the random oracle model, which shows that a passive adversary gains no information about the secret key. Our scheme is also a leakage-resilient secret-sharing scheme (LRSS) in the bounded-leakage model, which remain provably secure even if the adversary learns a bounded amount of leakage information about their secret key. As an application, we propose a new group identification protocol (GID-scheme) from our LRSS. We prove that our GID-scheme is a leakage-resilient scheme. In our leakage-resilient GID-scheme, the verifier believes the validity of qualified group members and tolerates l bits of adversarial leakage in the distribution protocol, whereas for unqualified group members, the verifier cannot believe their valid identifications in the proof protocol.http://dx.doi.org/10.1155/2020/1784276
spellingShingle Ping Li
Shengjun Li
Hongyang Yan
Lishan Ke
Teng Huang
Alzubair Hassan
A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme
Complexity
title A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme
title_full A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme
title_fullStr A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme
title_full_unstemmed A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme
title_short A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme
title_sort group identification protocol with leakage resilience of secret sharing scheme
url http://dx.doi.org/10.1155/2020/1784276
work_keys_str_mv AT pingli agroupidentificationprotocolwithleakageresilienceofsecretsharingscheme
AT shengjunli agroupidentificationprotocolwithleakageresilienceofsecretsharingscheme
AT hongyangyan agroupidentificationprotocolwithleakageresilienceofsecretsharingscheme
AT lishanke agroupidentificationprotocolwithleakageresilienceofsecretsharingscheme
AT tenghuang agroupidentificationprotocolwithleakageresilienceofsecretsharingscheme
AT alzubairhassan agroupidentificationprotocolwithleakageresilienceofsecretsharingscheme
AT pingli groupidentificationprotocolwithleakageresilienceofsecretsharingscheme
AT shengjunli groupidentificationprotocolwithleakageresilienceofsecretsharingscheme
AT hongyangyan groupidentificationprotocolwithleakageresilienceofsecretsharingscheme
AT lishanke groupidentificationprotocolwithleakageresilienceofsecretsharingscheme
AT tenghuang groupidentificationprotocolwithleakageresilienceofsecretsharingscheme
AT alzubairhassan groupidentificationprotocolwithleakageresilienceofsecretsharingscheme