Skip to main content
Log in

Detection and identification of cheaters in (t, n) secret sharing scheme

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

In a (t, n) secret sharing scheme, a secret s is divided into n shares and shared among a set of n shareholders by a mutually trusted dealer in such a way that any t or more than t shares will be able to reconstruct this secret; but fewer than t shares cannot know any information about the secret. When shareholders present their shares in the secret reconstruction phase, dishonest shareholder(s) (i.e. cheater(s)) can always exclusively derive the secret by presenting faked share(s) and thus the other honest shareholders get nothing but a faked secret. Cheater detection and identification are very important to achieve fair reconstruction of a secret. In this paper, we consider the situation that there are more than t shareholders participated in the secret reconstruction. Since there are more than t shares (i.e. it only requires t shares) for reconstructing the secret, the redundant shares can be used for cheater detection and identification. Our proposed scheme uses the shares generated by the dealer to reconstruct the secret and, at the same time, to detect and identify cheaters. We have included discussion on three attacks of cheaters and bounds of detectability and identifiability of our proposed scheme under these three attacks. Our proposed scheme is an extension of Shamir’s secret sharing scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Araki T.: Efficient (k, n) threshold secret sharing schemes secure against cheating from n – 1 cheaters. In: Proceedings of ACISP’07, LNCS, vol. 4586, pp. 13–142. Springer-Verlag (2007).

  2. Bhndo C., De Santis A., Gargano L., Vaccaro U.: Secret sharing schemes with veto capabilities. In: Proceedings of the First French-Israeli Workshop on Algebraic Coding, LNCS, vol. 781, pp. 82–89. Springer-Verlag (1993).

  3. Blakley G.R.: Safeguarding cryptographic keys. In: Proceedings of AFIPS’79, vol. 48, pp. 313–317 (1979).

  4. Brickell E.F., Stinson D.R.: The detection of cheaters in threshold schemes. In: Proceedings of Crypto’88, LNCS, vol. 403, pp. 564–577. Springer-Verlag (1990).

  5. Carpentieri M.: A perfect threshold secret sharing scheme to identify cheaters. Des. Codes Cryptogr. 5(3), 183–187 (1995)

    Article  MathSciNet  MATH  Google Scholar 

  6. Carpentieri M., De Santis A., Vaccaro U.: Size of shares and probability of cheating in threshold schemes. In: Proceedings of Eurocrypt’93, LNCS, vol. 765, pp. 118–125. Springer-Verlag (1994).

  7. Charnes C., Pieprzyk J., Safavi-Naini R.: Conditionally secure secret sharing scheme with disenrolment capability. In: Proceedings of CCS’94, pp. 89–95. ACM (1994).

  8. He J., Dawson E.: Shared secret reconstruction. Des. Codes Cryptogr. 14(3), 221–237 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  9. Kurosawa K., Obana S., Ogata W.: t-cheater identifiable (k, n) secret sharing schemes. In: Proceedings of Crypto’95, LNCS, vol. 963, pp. 410–423. Springer-Verlag (1995).

  10. Lin H.Y., Harn L.: A generalized secret sharing scheme with cheater detection. In: Proceedings of Asiacrypt’91, LNCS, vol. 739, pp. 149–158. Springer-Verlag (1991).

  11. McEliece R.J., Sarwate D.V.: On sharing secrets and Reed-Solomon codes. Comm. ACM 24, 583–584 (1981)

    Article  MathSciNet  Google Scholar 

  12. Ogata W., Kurosawa K., Stinson D.R.: Optimum secret sharing scheme secure against cheating. SIAM J. Discrete Math. 20(1), 79–95 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  13. Pieprzyk J., Zhang X.M.: Cheating prevention in linear secret sharing. In: Proceedings of ACISP’02, LNCS, vol. 2384, pp. 121–135. Springer-Verlag (2002).

  14. Rabin T., Ben-Or M.: Verifiable secret sharing and multiparty protocols with honest majority. In: Proceedings of the 21st Annual ACM Symposium on the Theory of Computing, pp. 73–85 (1989).

  15. Shamir A.: How to share a secret. Comm. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  16. Simmons G.: An introduction to shared secret schemes and their applications. Sandia Report SAND 88-2298 (1988).

  17. Tartary C., Wang H.: Dynamic threshold and cheater resistance for shamir secret sharing scheme. In: Proceedings of Inscrypt’06, LNCS, vol. 4318, pp. 103–117. Springer-Verlag (2006).

  18. Tompa M., Woll H.: How to share a secret with cheaters. J. Cryptol. 1(3), 133–138 (1989)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Changlu Lin.

Additional information

Communicated by P. Wild.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Harn, L., Lin, C. Detection and identification of cheaters in (t, n) secret sharing scheme. Des. Codes Cryptogr. 52, 15–24 (2009). https://doi.org/10.1007/s10623-008-9265-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-008-9265-8

Keywords

Mathematics Subject Classification (2000)

Navigation