Cheating identifiable secret sharing scheme using symmetric bivariate polynomial

Y Liu, C Yang, Y Wang, L Zhu, W Ji - Information Sciences, 2018 - Elsevier
In (k, n) secret sharing scheme, any m out of the n users (m≥ k) can reconstruct the secret
and any less than k users cannot get any information on the secret. However, some cheaters …

Quantum verifiable protocol for secure modulo zero-sum randomness

M Hayashi, T Koshiba - Quantum Information Processing, 2022 - Springer
We propose a new cryptographic resource, secure modulo zero-sum randomness, as a
resource to implement a task of secure modulo summation, and its quantum protocol …

Universal adaptive construction of verifiable secret sharing and its application to verifiable secure distributed data storage

M Hayashi, T Koshiba - IEEE/ACM Transactions on Networking, 2023 - ieeexplore.ieee.org
Secret sharing is a useful method for secure distributed data storage. Such a distributed data
storage can avoid the information leakage under an attack to a limited number of distributed …

Efficient secure computation enabled by blockchain technology

G Zyskind - 2016 - dspace.mit.edu
For several decades, secure multiparty computation has been the topic of extensive
research, as it enables computing any functionality in a privacy-preserving manner, while …

Secrecy and robustness for active attack in secure network coding

M Hayashi, M Owari, G Kato… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
In the network coding, we discuss the effect by sequential error injection to information
leakage. We show that there is no improvement when the network is composed of linear …

Secret sharing schemes on compartmental access structure in presence of cheaters

J Pramanik, PS Roy, S Dutta, A Adhikari… - … on Information Systems …, 2018 - Springer
Various adversarial scenarios have been considered in secret sharing for threshold access
structure. However, threshold access structure can not provide efficient solution when …

Evolving secret sharing with essential participants

J Pramanik, A Adhikari - … of International Conference on Frontiers in …, 2021 - Springer
Komargodski et al. introduced Evolving Secret Sharing which allows an impartial participant,
called dealer, to share a secret among unbounded number of participants over any given …

Universal construction of cheater-identifiable secret sharing against rushing cheaters based on message authentication

M Hayashi, T Koshiba - 2018 IEEE International Symposium on …, 2018 - ieeexplore.ieee.org
For conventional secret sharing, if cheaters can submit possibly forged shares after
observing shares of the honest users in the reconstruction phase, they can disturb the …

Verifiable quantum secure modulo summation

M Hayashi, T Koshiba - arXiv preprint arXiv:1910.05976, 2019 - arxiv.org
We propose a new cryptographic task, which we call verifiable quantum secure modulo
summation. Secure modulo summation is a calculation of modulo summation $ Y_1+\ldots+ …

Asymptotically secure network code for active attacks

M Hayashi, N Cai - IEEE Transactions on Communications, 2021 - ieeexplore.ieee.org
When there exists a malicious attacker in the network, we need to be careful of
eavesdropping and contamination. This problem is crucial for network communication when …