methods. Therefore, the comparison is omitted
herein.
From Table 1, the proposed scheme has less data
stored by each server, and it is also possible to detect
unauthorized servers.
In addition, only the proposed method is not
limited as to the prime number that is the module in
calculation.
Tables 1 and 2 shows that the proposed scheme
only requires the share compared to the other method,
and the secret and prime number used are not restrics.
6 PRACTICALITY
Currently, individuals and companies are big data
societies with a lot of information. There are two
ways to save data: 1) using the on-premises type
servers owned by each individual, and 2) using the
cloud type servers deposited in a virtual environment
on the Internet.
Recently, individuals and many companies have
begun to use data storage systems such as
MicrosoftAzure, -Google Drive, and iCloud.
However, data on the cloud are the target of
malicious attackers and the leakage of customer
information has been in the news multiple times.
When a secret sharing scheme is used to protect
customer information, schemes other than
asymmetric secret sharing have no means of
preventing information leakage.
Therefore, as an example of application of our
proposed extended asymmetric secret sharing
scheme, we use it to protect customer information. In
this case, the customer, as the owner, distributes their
information using the extended asymmetric secret
sharing scheme, and manages keys securely. If the
number of shares deposited in the data server is k-1 or
less, the customer information is protected even if the
information stored in all the data servers leaks. In
addition, it is possible to efficiently confirm whether
the restored information has been falsified by our
extended asymmetric secret sharing scheme.
Therefore, the proposed scheme realizes safe and
low-cost customer service.
7 CONCLUSIONS
We proposed herein extended asymmetric secret
sharing schemes to verify secret reconstruction at
.
By concealing the server ID, we secured against
attack using the weak point of the Lagrange's
interpolation formula. Consequently, our schemes
can show the legitimacy of the reconstructed secret by
performing u + 1 times or 2 times the reconstruction
without using special functions, such as an
authenticator. Furthermore, the server held only the
share for which , and the secret and the finite
field used were not restricted.
REFERENCES
A. Shamir., 1979. How to share a secret, Communications
of the ACM, vol. 22, no. 11, pp. 612–613.
S. Cabello., C. Padró., G. Sáez., 2002. Secret sharing
schemes with detection of cheaters for a general access
structure, Designs, Codes and Cryptography, vol. 25,
pp. 175–188.
W. Ogata., T. Araki., 2013. Cheating detectable secret
sharing schemes for random bit strings, IEICE Trans.
Fundamentals, vol. E96-A, no. 11.
W. Ogata., T. Satoshi., 2013. Cheating detectable secret
sharing schemes for random bit strings, IEICE Trans.
Fundamentals, vol. E96-A, no. 11.
H. Hoshino., S. Obana., 2015. Almost optimum secret
sharing schemes with cheating detection for random bit
strings, Advances in Information and Computer
Security, Lecture Notes in Computer Science, vol. 9241,
Springer Verlag, pp. 213–222.
X. Zhu., 2017. Efficient (k, n) Secret sharing scheme secure
against k − 2 cheaters. International Conference on
Networking and Network Applications.
Q. Al Mahmoud., 2016. A novel verifiable secret
sharingwith detection and identification of cheaters’
group, I.J. Mathematical Sciences and Computing.
Narita Tasuku., KitagawaFuyuki., Yoshida Yusuke., Tanaka
Keisuke., 2019, Secret sharing satisfying computational
tamper resistance, SCIS.
S. Takahashi., K. Iwamura., 2014. Asymmetric
secretsharing scheme suitable for cloud systems, 2014
IEEE 11th Consumer Communications andNetworking
Conference, pp. 798–804, Las Vegas.
S. Takahashi., K. Iwamura, 2013. Secret sharing scheme
suitable for cloud computing, The 27th IEEE
International Conference on Advanced Information
Networking and Applications, pp. 530–537, Barcelona.
P. Sarathi Roy., A. Adhikari., R. Xu., K. Morozov., K.
Sakurai.,2014. An efficient t-cheater identifiable secret
sharing scheme with optimal cheater resiliency,
International Conference on Security, Privacy, and
Applied Cryptography, pp. 47–58.
Y. Liu., C. Yang., Y. Wang., L. Zhu., W. Ji., 2018.Cheating
identifiable secret sharing scheme using symmetric
bivariate polynomial, Information Sciences 453, pp.
21–29.
W. Ogata., T. Araki., 2017. Computationally secure
verifiable secret sharing scheme for distributing many
ICE-B 2019 - 16th International Conference on e-Business
178