|
计算机应用 2007
Analysis and improvement of multi-secret sharing scheme based on general access structure
|
Abstract:
Peng proposed an efficient multi-secret sharing scheme based on general access structure in 2006. In his scheme, not only the shares held by the participants are reusable, but also the shares distributed by the dealer and the shadow shares provided by participants are verifiable. The security of Peng's scheme was analyzed and two attacking methods were proposed. It demonstrates that both of the share-authenticating and shadow-secret-authenticating methods are insecure. Using our attacks, a dishonest dealer can distribute fake shares to participants, and malicious participants can easily forge fake shadow shares, so the honest participants will be cheated. At last, improvement was made to avoid those attacks.