We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Cheater Detection and Cheating Identification based on Shamir Scheme

Published on May 2012 by Rupali Kolambe, Megha Kamble
National Conference on Recent Trends in Computing
Foundation of Computer Science USA
NCRTC - Number 5
May 2012
Authors: Rupali Kolambe, Megha Kamble
07431272-8687-45f8-8e7a-ac88c879403b

Rupali Kolambe, Megha Kamble . Cheater Detection and Cheating Identification based on Shamir Scheme. National Conference on Recent Trends in Computing. NCRTC, 5 (May 2012), 12-15.

@article{
author = { Rupali Kolambe, Megha Kamble },
title = { Cheater Detection and Cheating Identification based on Shamir Scheme },
journal = { National Conference on Recent Trends in Computing },
issue_date = { May 2012 },
volume = { NCRTC },
number = { 5 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 12-15 },
numpages = 4,
url = { /proceedings/ncrtc/number5/6546-1036/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Computing
%A Rupali Kolambe
%A Megha Kamble
%T Cheater Detection and Cheating Identification based on Shamir Scheme
%J National Conference on Recent Trends in Computing
%@ 0975-8887
%V NCRTC
%N 5
%P 12-15
%D 2012
%I International Journal of Computer Applications
Abstract

In cryptography, a secret sharing scheme is a method for distributing a secret amongst a group of participants, each of which is allocated a share of the secret. The secret can only be reconstructed when the shares are combined together; individual shares are of no use on their own. The study of secret sharing schemes was independently initiated by Shamir[10] and Blakely[3] in 1979. Since then several other secret sharing schemes were introduced. Many of those schemes are (n,k) threshold systems. When shareholders present their shares in the secret reconstruction phase, dishonest shareholder(s) (i. e. cheater(s)) can always exclusively derive the secret by presenting faked share(s) and thus the other honest shareholders get nothing but a faked secret. Tompa and Woll[12] also suggested that Cheater detection and identification are very important to achieve fair reconstruction of a secret. Our proposed scheme uses the shares generated by the dealer to reconstruct the secret and, at the same time, to detect and identify cheaters We have included discussion on three attacks of cheaters and bounds of detectability and identifiability of our proposed scheme under these three attacks. Our proposed scheme is an extension of Shamir's secret sharing scheme.

References
  1. W. Trappe and l . C. Washington, Introduction to Cryptography with Coding Theory, Pearson International Edition (2006)
  2. C. C. Thien and J. C. Lin, "Secret image sharing," Computers & Graphics, vol. 26, no. 1, 765-770, 2002.
  3. Blakley G. R. : Safeguarding cryptographic keys. In: Proceedings of AFIPS'79, vol. 48, pp. 313– 317 (1979).
  4. Brickell E. F. , Stinson D. R. : The detection of cheaters in threshold schemes. In: Proceedings of Crypto'88, LNCS, vol. 403, pp. 564–577. Springer-Verlag (1990).
  5. CarpentieriM. : A perfect threshold secret sharing scheme to Identify cheaters. Des. Codes Cryptogr. 5(3), 183–187 (1995).
  6. CarpentieriM. , De Santis A. , Vaccaro U. : Size of shares and Probability of cheating in threshold schemes. In: Proceedings of Eurocrypt'93, LNCS, vol. 765, pp. 118 125. Springer-Verlag (1994).
  7. Charnes C. , Pieprzyk J. , Safavi-Naini R. : Conditionally Secure secret sharing scheme with disenrollment capability. In: Proceedings of CCS'94, pp. 89–95. ACM (1994).
  8. Kurosawa K. , Obana S. , Ogata W. : t-cheater identifiable (k, n) secret sharing schemes. In: Proceedings of Crypto'95, LNCS, vol. 963, pp. 410–423. Springer-Verlag (1995).
  9. Rabin T. , Ben- Or M. : Verifiable secret sharing and multiparty protocols with honest majority. In: Proceedings of the 21st Annual ACM Symposium on the Theory of Computing, pp. 73–85 (1989).
  10. Shamir A. : How to share a secret. Comm. ACM 22(11), 612–613 (1979).
  11. Simmons G. : An introduction to shared secret schemes and their applications. Sandia Report SAND 88-2298 (1988).
  12. Tompa M. , Woll H. : How to share a secret with cheaters. J. Cryptol. 1(3), 133–138 (1989)
Index Terms

Computer Science
Information Sciences

Keywords

Secret Sharing Scheme Detection Identification attacks Consistency Majority Voting