Public verifiability from pairings in secret sharing schemes
dc.contributor.author | Heidarvand, Somayed |
dc.contributor.author | Villar Santos, Jorge Luis |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament de Matemàtica Aplicada IV |
dc.date.accessioned | 2010-09-20T11:46:41Z |
dc.date.available | 2010-09-20T11:46:41Z |
dc.date.created | 2009 |
dc.date.issued | 2009 |
dc.identifier.citation | Heidarvand, S.; Villar, J. Public verifiability from pairings in secret sharing schemes. "Lecture notes in computer science", 2009, vol. 5381, p. 294-308. |
dc.identifier.issn | 0302-9743 |
dc.identifier.uri | http://hdl.handle.net/2117/8968 |
dc.description.abstract | In this paper we propose a new publicly verifiable secret sharing scheme using pairings with close relations to Shoenmakers’ scheme. This scheme is efficient, multiplicatively homomorphic and with unconditional verifiability in the standard model. We formalize the notion of Indistinguishability of Secrets and prove that out scheme achieves it under the Decisional Bilinear Square (DBS) Assumption that is a natural variant of the Decisional Bilinear Diffie Hellman Assumption. Moreover, our scheme tolerates active and adaptive adversaries. |
dc.format.extent | 15 p. |
dc.language.iso | eng |
dc.subject | Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica::Criptografia |
dc.subject.lcsh | Threshold cryptosystem |
dc.subject.lcsh | Cryptography -- Mathematical models |
dc.subject.lcsh | Pairing |
dc.title | Public verifiability from pairings in secret sharing schemes |
dc.type | Article |
dc.subject.lemac | Criptografia -- Mètodes estadístics |
dc.contributor.group | Universitat Politècnica de Catalunya. MAK - Matemàtica Aplicada a la Criptografia |
dc.identifier.doi | 10.1007/978-3-642-04159-4 |
dc.description.peerreviewed | Peer Reviewed |
dc.rights.access | Restricted access - publisher's policy |
local.identifier.drac | 2755529 |
dc.description.version | Postprint (published version) |
local.citation.author | Heidarvand, S.; Villar, J. |
local.citation.publicationName | Lecture notes in computer science |
local.citation.volume | 5381 |
local.citation.startingPage | 294 |
local.citation.endingPage | 308 |
Files in this item
This item appears in the following Collection(s)
-
Articles de revista [45]
-
Articles de revista [2.542]
All rights reserved. This work is protected by the corresponding intellectual and industrial
property rights. Without prejudice to any existing legal exemptions, reproduction, distribution, public
communication or transformation of this work are prohibited without permission of the copyright holder