Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Cheater Detection and Cheating Identification based on Shamir Scheme

Print
PDF
IJCA Proceedings on National Conference on Recent Trends in Computing
© 2012 by IJCA Journal
NCRTC - Number 5
Year of Publication: 2012
Authors:
Rupali Kolambe
Megha Kamble

Rupali Kolambe and Megha Kamble. Article: Cheater Detection and Cheating Identification based on Shamir Scheme. IJCA Proceedings on National Conference on Recent Trends in Computing NCRTC(5):12-15, May 2012. Full text available. BibTeX

@article{key:article,
	author = {Rupali Kolambe and Megha Kamble},
	title = {Article: Cheater Detection and Cheating Identification based on Shamir Scheme},
	journal = {IJCA Proceedings on National Conference on Recent Trends in Computing},
	year = {2012},
	volume = {NCRTC},
	number = {5},
	pages = {12-15},
	month = {May},
	note = {Full text available}
}

Abstract

In cryptography, a secret sharing scheme is a method for distributing a secret amongst a group of participants, each of which is allocated a share of the secret. The secret can only be reconstructed when the shares are combined together; individual shares are of no use on their own. The study of secret sharing schemes was independently initiated by Shamir[10] and Blakely[3] in 1979. Since then several other secret sharing schemes were introduced. Many of those schemes are (n,k) threshold systems. When shareholders present their shares in the secret reconstruction phase, dishonest shareholder(s) (i. e. cheater(s)) can always exclusively derive the secret by presenting faked share(s) and thus the other honest shareholders get nothing but a faked secret. Tompa and Woll[12] also suggested that Cheater detection and identification are very important to achieve fair reconstruction of a secret. Our proposed scheme uses the shares generated by the dealer to reconstruct the secret and, at the same time, to detect and identify cheaters We have included discussion on three attacks of cheaters and bounds of detectability and identifiability of our proposed scheme under these three attacks. Our proposed scheme is an extension of Shamir's secret sharing scheme.

References

  • W. Trappe and l . C. Washington, Introduction to Cryptography with Coding Theory, Pearson International Edition (2006)
  • C. C. Thien and J. C. Lin, "Secret image sharing," Computers & Graphics, vol. 26, no. 1, 765-770, 2002.
  • Blakley G. R. : Safeguarding cryptographic keys. In: Proceedings of AFIPS'79, vol. 48, pp. 313– 317 (1979).
  • Brickell E. F. , Stinson D. R. : The detection of cheaters in threshold schemes. In: Proceedings of Crypto'88, LNCS, vol. 403, pp. 564–577. Springer-Verlag (1990).
  • CarpentieriM. : A perfect threshold secret sharing scheme to Identify cheaters. Des. Codes Cryptogr. 5(3), 183–187 (1995).
  • CarpentieriM. , De Santis A. , Vaccaro U. : Size of shares and Probability of cheating in threshold schemes. In: Proceedings of Eurocrypt'93, LNCS, vol. 765, pp. 118 125. Springer-Verlag (1994).
  • Charnes C. , Pieprzyk J. , Safavi-Naini R. : Conditionally Secure secret sharing scheme with disenrollment capability. In: Proceedings of CCS'94, pp. 89–95. ACM (1994).
  • Kurosawa K. , Obana S. , Ogata W. : t-cheater identifiable (k, n) secret sharing schemes. In: Proceedings of Crypto'95, LNCS, vol. 963, pp. 410–423. Springer-Verlag (1995).
  • Rabin T. , Ben- Or M. : Verifiable secret sharing and multiparty protocols with honest majority. In: Proceedings of the 21st Annual ACM Symposium on the Theory of Computing, pp. 73–85 (1989).
  • Shamir A. : How to share a secret. Comm. ACM 22(11), 612–613 (1979).
  • Simmons G. : An introduction to shared secret schemes and their applications. Sandia Report SAND 88-2298 (1988).
  • Tompa M. , Woll H. : How to share a secret with cheaters. J. Cryptol. 1(3), 133–138 (1989)