Generalised cheater detection and identification

Cheater detection and identification are important issues in the process of secret reconstruction. To detect and identify cheaters most of the algorithms need the dealer to generate and distribute additional information to shareholders. Recently, algorithms have been proposed to detect and identify...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:IET information security Ročník 8; číslo 3; s. 171 - 178
Hlavný autor: Harn, Lein
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Stevenage The Institution of Engineering and Technology 01.05.2014
John Wiley & Sons, Inc
Predmet:
ISSN:1751-8709, 1751-8717
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Cheater detection and identification are important issues in the process of secret reconstruction. To detect and identify cheaters most of the algorithms need the dealer to generate and distribute additional information to shareholders. Recently, algorithms have been proposed to detect and identify cheaters. If more than t (i.e. the threshold) shares, for example j (i.e. t < j) shares in the secret reconstruction, then redundancy of shares can be used to detect and identify cheaters. The detectability and identifiability of cheaters are proportional to the number of redundant shares. However, the number of redundant shares, j − t is fixed if original shares are used in the secret reconstruction. So, a threshold changeable verifiable secret sharing (TCVSS) has been developed, which allows shareholders working together to change the threshold t into a new threshold t′ (i.e. t′ < j) and generate new shares; whereas at the same time, maintain the original secret. The verifiability of the proposed TCVSS enables shareholders to verify that their new shares have been properly generated. The number of redundant shares can be changed to j − t′  if new shares are used in the secret reconstruction. Discussion on how to determine the new threshold t′ in order to detect and identify cheaters successfully has also been included.
AbstractList Cheater detection and identification are important issues in the process of secret reconstruction. To detect and identify cheaters most of the algorithms need the dealer to generate and distribute additional information to shareholders. Recently, algorithms have been proposed to detect and identify cheaters. If more than t (i.e. the threshold) shares, for example j (i.e. t < j ) shares in the secret reconstruction, then redundancy of shares can be used to detect and identify cheaters. The detectability and identifiability of cheaters are proportional to the number of redundant shares. However, the number of redundant shares, j − t is fixed if original shares are used in the secret reconstruction. So, a threshold changeable verifiable secret sharing (TCVSS) has been developed, which allows shareholders working together to change the threshold t into a new threshold t ′ (i.e. t ′ < j ) and generate new shares; whereas at the same time, maintain the original secret. The verifiability of the proposed TCVSS enables shareholders to verify that their new shares have been properly generated. The number of redundant shares can be changed to j − t ′ if new shares are used in the secret reconstruction. Discussion on how to determine the new threshold t ′ in order to detect and identify cheaters successfully has also been included.
Cheater detection and identification are important issues in the process of secret reconstruction. To detect and identify cheaters most of the algorithms need the dealer to generate and distribute additional information to shareholders. Recently, algorithms have been proposed to detect and identify cheaters. If more than t (i.e. the threshold) shares, for example j (i.e. t < j) shares in the secret reconstruction, then redundancy of shares can be used to detect and identify cheaters. The detectability and identifiability of cheaters are proportional to the number of redundant shares. However, the number of redundant shares, j - t is fixed if original shares are used in the secret reconstruction. So, a threshold changeable verifiable secret sharing (TCVSS) has been developed, which allows shareholders working together to change the threshold t into a new threshold t' (i.e. t' < j) and generate new shares; whereas at the same time, maintain the original secret. The verifiability of the proposed TCVSS enables shareholders to verify that their new shares have been properly generated. The number of redundant shares can be changed to j - t' if new shares are used in the secret reconstruction. Discussion on how to determine the new threshold t' in order to detect and identify cheaters successfully has also been included.
Cheater detection and identification are important issues in the process of secret reconstruction. To detect and identify cheaters most of the algorithms need the dealer to generate and distribute additional information to shareholders. Recently, algorithms have been proposed to detect and identify cheaters. If more than t (i.e. the threshold) shares, for example j (i.e. t < j) shares in the secret reconstruction, then redundancy of shares can be used to detect and identify cheaters. The detectability and identifiability of cheaters are proportional to the number of redundant shares. However, the number of redundant shares, j − t is fixed if original shares are used in the secret reconstruction. So, a threshold changeable verifiable secret sharing (TCVSS) has been developed, which allows shareholders working together to change the threshold t into a new threshold t′ (i.e. t′ < j) and generate new shares; whereas at the same time, maintain the original secret. The verifiability of the proposed TCVSS enables shareholders to verify that their new shares have been properly generated. The number of redundant shares can be changed to j − t′  if new shares are used in the secret reconstruction. Discussion on how to determine the new threshold t′ in order to detect and identify cheaters successfully has also been included.
Author Harn, Lein
Author_xml – sequence: 1
  givenname: Lein
  surname: Harn
  fullname: Harn, Lein
  email: harnl@umkc.edu
  organization: Department of Computer Science Electrical Engineering, University of Missouri, Kansas City, USA
BookMark eNqFkE1rGzEQQEVJoc7HD8jNkEt6WHdGu9qVekuD7RgCOdg9C1kaUYXNriOtKfn30dYlFNO0Jwnxnph5p-yk6zti7BJhhlCpL4GGIvg044B8BqXED2yCjcBCNticvN1BfWKnKT0CiFqAmjBYUkfRtCGRm9ofZAaKU0cD2SH03dR0bhocdUPwwZrx6Zx99KZNdPH7PGPfF_PN7V1x_7Bc3d7cF7ZqOC8ESbLOkCJvK2WFRA4KeNlQWSpFPEMWcSuEd87XWy55A1JYJ9ELgxzLM3Z9-HcX--c9pUE_hWSpbU1H_T5prDlAUymQGb06Qh_7fezydBqFkLKqhSwz1RwoG_uUInltw_BrpSGa0GoEPZbUuaTOJfVYUo8ls4lH5i6GJxNf_ul8PTg_Q0sv_xf0aj3n3xYAUPMsfz7II_a2y2q-0avF-g9n53xmi7-w7w_2ChYRpyA
CitedBy_id crossref_primary_10_1049_iet_ifs_2019_0203
crossref_primary_10_1080_00207160_2025_2493959
crossref_primary_10_3390_s22010331
crossref_primary_10_1155_2019_5134534
Cites_doi 10.1109/SFCS.1987.4
10.1007/978-3-540-30539-2_13
10.1007/3-540-46766-1_9
10.1007/3-540-48329-2_10
10.1007/11937807_9
10.1016/j.ins.2010.04.016
10.1007/3-540-44750-4_27
10.1007/978-3-540-89641-8_14
10.1007/3-540-47721-7_19
10.1145/358746.358762
10.1007/s10623-008-9265-8
10.1109/SFCS.1985.64
10.1007/3-540-46513-8_15
10.1023/A:1008200702849
10.1007/3-540-57843-9_11
10.1007/3-540-44750-4_33
10.1007/3-540-47719-5_32
10.1145/73007.73014
10.1007/3-540-48970-3_15
10.1145/359168.359176
10.1109/AINA.2010.56
10.1109/IEEC.2009.54
10.1007/3-540-48285-7_10
10.1007/978-3-642-14496-7_7
10.1007/BF02252871
ContentType Journal Article
Copyright The Institution of Engineering and Technology
2020 The Institution of Engineering and Technology
Copyright The Institution of Engineering & Technology May 2014
Copyright_xml – notice: The Institution of Engineering and Technology
– notice: 2020 The Institution of Engineering and Technology
– notice: Copyright The Institution of Engineering & Technology May 2014
DBID AAYXX
CITATION
3V.
7XB
8AL
8FE
8FG
8FK
ABJCF
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L6V
M0N
M7S
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
Q9U
S0W
7SC
7SP
8FD
F28
FR3
L7M
L~C
L~D
DOI 10.1049/iet-ifs.2012.0381
DatabaseName CrossRef
ProQuest Central (Corporate)
ProQuest Central (purchase pre-March 2016)
Computing Database (Alumni Edition)
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
Materials Science & Engineering Database
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Database
ProQuest Central Essentials Local Electronic Collection Information
ProQuest Central
Technology collection
ProQuest One
ProQuest Central
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
ProQuest Engineering Collection
Computing Database
Engineering Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
ProQuest Central Basic
DELNET Engineering & Technology Collection
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
Engineering Collection
Advanced Technologies & Aerospace Collection
ProQuest Computing
Engineering Database
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest DELNET Engineering and Technology Collection
Materials Science & Engineering Collection
ProQuest One Academic
ProQuest Central (Alumni)
ProQuest One Academic (New)
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
ANTE: Abstracts in New Technology & Engineering
Computer and Information Systems Abstracts Professional
DatabaseTitleList CrossRef
Technology Research Database

Computer Science Database

Database_xml – sequence: 1
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1751-8717
EndPage 178
ExternalDocumentID 3419643941
10_1049_iet_ifs_2012_0381
ISE2BF00062
Genre article
Feature
GroupedDBID 0R
24P
29I
3V.
4.4
5GY
6IK
8AL
8FE
8FG
AAJGR
ABJCF
ABUWG
ACGFS
ACIWK
AENEX
AFKRA
ALMA_UNASSIGNED_HOLDINGS
ARAPS
AZQEC
BENPR
BFFAM
BGLVJ
BPHCQ
CS3
DU5
DWQXO
EBS
EJD
GNUQQ
HCIFZ
HZ
IFIPE
IPLJI
JAVBF
K6V
K7-
L6V
LAI
LOTEE
LXI
LXU
M0N
M43
M7S
NADUK
NXXTH
O9-
OCL
P2P
P62
PQEST
PQQKQ
PQUKI
PROAC
PTHSS
RIE
RIG
RNS
RUI
S0W
UNMZH
UNR
ZZ
.DC
0R~
0ZK
1OC
AAHHS
AAHJG
ABMDY
ABQXS
ACCFJ
ACCMX
ACESK
ACGFO
ADEYR
ADZOD
AEEZP
AEGXH
AEQDE
AIAGR
AIWBW
AJBDE
ALUQN
AVUZU
CCPQU
GROUPED_DOAJ
HZ~
IAO
ITC
MCNEO
OK1
ROL
~ZZ
AAMMB
AAYXX
AEFGJ
AFFHD
AGXDD
AIDQK
AIDYY
CITATION
IDLOA
PHGZM
PHGZT
PQGLB
WIN
7XB
8FK
JQ2
PKEHL
PRINS
Q9U
7SC
7SP
8FD
F28
FR3
L7M
L~C
L~D
PUEGO
ID FETCH-LOGICAL-c4722-5e8ecdae9efc49c5812090237e3399e2472c11b55fddf6b2827085cd81f5a1213
IEDL.DBID BENPR
ISICitedReferencesCount 5
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000335178600003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1751-8709
IngestDate Thu Sep 04 17:10:02 EDT 2025
Wed Aug 13 08:14:55 EDT 2025
Wed Oct 29 21:43:45 EDT 2025
Tue Nov 18 22:27:20 EST 2025
Wed Jan 22 16:32:42 EST 2025
Thu May 09 18:13:39 EDT 2019
Tue Jan 05 21:44:05 EST 2021
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords share redundancy
interpolation
secret reconstruction process
polynomials
TCVSS
cryptography
threshold changeable verifiable secret sharing
Lagrange interpolating polynomial
generalised cheater identification
generalised cheater detection
Language English
License http://onlinelibrary.wiley.com/termsAndConditions#vor
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c4722-5e8ecdae9efc49c5812090237e3399e2472c11b55fddf6b2827085cd81f5a1213
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-1
ObjectType-Feature-2
content type line 23
OpenAccessLink https://onlinelibrary.wiley.com/doi/pdfdirect/10.1049/iet-ifs.2012.0381
PQID 1558846583
PQPubID 1936350
PageCount 8
ParticipantIDs proquest_miscellaneous_1620074908
proquest_journals_1558846583
iet_journals_10_1049_iet_ifs_2012_0381
crossref_primary_10_1049_iet_ifs_2012_0381
wiley_primary_10_1049_iet_ifs_2012_0381_ISE2BF00062
crossref_citationtrail_10_1049_iet_ifs_2012_0381
ProviderPackageCode RUI
PublicationCentury 2000
PublicationDate May 2014
PublicationDateYYYYMMDD 2014-05-01
PublicationDate_xml – month: 05
  year: 2014
  text: May 2014
PublicationDecade 2010
PublicationPlace Stevenage
PublicationPlace_xml – name: Stevenage
PublicationTitle IET information security
PublicationYear 2014
Publisher The Institution of Engineering and Technology
John Wiley & Sons, Inc
Publisher_xml – name: The Institution of Engineering and Technology
– name: John Wiley & Sons, Inc
References Shamir, A. (C1) 1979; 22
He, J.; Dawson, E. (C6) 1998; 14
Harn, L.; Lin, C. (C9) 2009; 52
Harn, L.; Lin, C. (C25) 2010; 180
Tompa, M.; Wollm, H. (C2) 1989; 1
McEliece, R.J.; Sarwate, D.V. (C7) 1981; 24
Martin, K.; Pieprzyk, J.; Safavi-Naini, R.; Wang, H. (C10) 1999; 31
2009; 52
1989; 1
2001
2000
2010
2009
1987
1981; 24
2008
1985
1995
2006
1994
1999; 31
1993
2004
1992
2010; 180
1979; 22
1989
1998; 14
1999
e_1_2_7_5_2
e_1_2_7_4_2
e_1_2_7_3_2
e_1_2_7_2_2
e_1_2_7_9_2
e_1_2_7_8_2
e_1_2_7_7_2
e_1_2_7_6_2
e_1_2_7_19_2
Martin K. (e_1_2_7_11_2) 1999; 31
e_1_2_7_18_2
e_1_2_7_17_2
e_1_2_7_16_2
e_1_2_7_15_2
e_1_2_7_14_2
e_1_2_7_13_2
e_1_2_7_12_2
e_1_2_7_10_2
e_1_2_7_26_2
e_1_2_7_27_2
e_1_2_7_28_2
e_1_2_7_25_2
e_1_2_7_24_2
e_1_2_7_23_2
e_1_2_7_22_2
e_1_2_7_21_2
e_1_2_7_20_2
References_xml – volume: 31
  start-page: 34
  year: 1999
  end-page: 43
  ident: C10
  article-title: Changing thresholds in the absence of secure channels
  publication-title: J. Australian Comput.
– volume: 1
  start-page: 133
  issue: 3
  year: 1989
  end-page: 138
  ident: C2
  article-title: How to share a secret with cheaters
  publication-title: J. Cryptol.
– volume: 180
  start-page: 3059
  issue: 16
  year: 2010
  end-page: 3064
  ident: C25
  article-title: Strong ( , , ) verifiable secret sharing scheme
  publication-title: Inf. Sci.
– volume: 24
  start-page: 583
  issue: 9
  year: 1981
  end-page: 584
  ident: C7
  article-title: On sharing secrets and Reed-Solomon codes
  publication-title: Commun. ACM
– volume: 14
  start-page: 221
  issue: 3
  year: 1998
  end-page: 237
  ident: C6
  article-title: Shared secret reconstruction
  publication-title: Des. Codes Cryptogr.
– volume: 52
  start-page: 15
  issue: 1
  year: 2009
  end-page: 24
  ident: C9
  article-title: Detection and identification of cheaters in ( , ) secret sharing scheme
  publication-title: Des. Codes Cryptogr.
– volume: 22
  start-page: 612
  issue: 11
  year: 1979
  end-page: 613
  ident: C1
  article-title: How to share a secret
  publication-title: Commun. ACM
– start-page: 74
  year: 2010
  end-page: 92
  article-title: Efficient statistical asynchronous verifiable secret sharing with optimal resilience
– start-page: 200
  year: 2000
  end-page: 214
  article-title: Unconditionally secure proactive secret sharing scheme with combinatorial structures
– start-page: 403
  year: 2001
  end-page: 416
  article-title: Efficient and unconditionally secure verifiable threshold changeable scheme
– start-page: 110
  year: 1993
  end-page: 125
  article-title: Fully dynamic secret sharing schemes
– start-page: 73
  year: 1989
  end-page: 85
  article-title: Verifiable secret sharing and multiparty protocols with honest majority
– volume: 1
  start-page: 133
  issue: 3
  year: 1989
  end-page: 138
  article-title: How to share a secret with cheaters
  publication-title: J. Cryptol.
– volume: 52
  start-page: 15
  issue: 1
  year: 2009
  end-page: 24
  article-title: Detection and identification of cheaters in ( , ) secret sharing scheme
  publication-title: Des. Codes Cryptogr.
– start-page: 427
  year: 1987
  end-page: 437
  article-title: A practical scheme for non‐interactive verifiable secret sharing
– start-page: 196
  year: 2008
  end-page: 213
  article-title: Analysis and design of multiple threshold changeable secret sharing schemes
– start-page: 251
  year: 1987
  end-page: 260
  article-title: Secret sharing homomorphisms: keeping shares of a secret secret
– year: 2010
– start-page: 129
  year: 1992
  end-page: 140
  article-title: Non‐interactive and information‐theoretic secure verifiable secret sharing
– start-page: 383
  year: 1985
  end-page: 395
  article-title: Verifiable secret sharing and achieving simultaneously in the presence of faults
– start-page: 238
  year: 2009
  end-page: 246
  article-title: A secret sharing scheme with the changeable threshold value
– start-page: 745
  year: 2010
  end-page: 752
  article-title: Collusion attack resistance and practice‐oriented threshold changeable sharing schemes
– start-page: 118
  year: 1994
  end-page: 125
  article-title: Size of shares and probability of cheating in threshold schemes
– volume: 24
  start-page: 583
  issue: 9
  year: 1981
  end-page: 584
  article-title: On sharing secrets and Reed‐Solomon codes
  publication-title: Commun. ACM
– start-page: 339
  year: 1995
  end-page: 352
  article-title: Proactive secret sharing or: how to cope with perpetual leakage
– start-page: 177
  year: 1999
  end-page: 19
  article-title: Changing thresholds in the absence of secure channels
– start-page: 410
  year: 1995
  end-page: 423
  article-title: ‐cheater identifiable ( , ) secret sharing schemes
– volume: 14
  start-page: 221
  issue: 3
  year: 1998
  end-page: 237
  article-title: Shared secret reconstruction
  publication-title: Des. Codes Cryptogr.
– volume: 31
  start-page: 34
  year: 1999
  end-page: 43
  article-title: Changing thresholds in the absence of secure channels
  publication-title: J. Australian Comput.
– start-page: 82
  year: 1993
  end-page: 89
  article-title: Secret sharing schemes with veto capabilities
– start-page: 103
  year: 2006
  end-page: 117
  article-title: Dynamic threshold and cheater resistance for Shamir secret sharing scheme
– start-page: 170
  year: 2004
  end-page: 186
  article-title: Lattice‐based threshold changeability for standard Shamir secret‐sharing schemes
– volume: 180
  start-page: 3059
  issue: 16
  year: 2010
  end-page: 3064
  article-title: Strong ( , , ) verifiable secret sharing scheme
  publication-title: Inf. Sci.
– volume: 22
  start-page: 612
  issue: 11
  year: 1979
  end-page: 613
  article-title: How to share a secret
  publication-title: Commun. ACM
– ident: e_1_2_7_21_2
  doi: 10.1109/SFCS.1987.4
– ident: e_1_2_7_19_2
  doi: 10.1007/978-3-540-30539-2_13
– ident: e_1_2_7_22_2
  doi: 10.1007/3-540-46766-1_9
– ident: e_1_2_7_12_2
  doi: 10.1007/3-540-48329-2_10
– ident: e_1_2_7_20_2
  doi: 10.1007/11937807_9
– ident: e_1_2_7_26_2
  doi: 10.1016/j.ins.2010.04.016
– ident: e_1_2_7_27_2
  doi: 10.1007/3-540-44750-4_27
– ident: e_1_2_7_13_2
  doi: 10.1007/978-3-540-89641-8_14
– volume: 31
  start-page: 34
  year: 1999
  ident: e_1_2_7_11_2
  article-title: Changing thresholds in the absence of secure channels
  publication-title: J. Australian Comput.
– ident: e_1_2_7_23_2
  doi: 10.1007/3-540-47721-7_19
– ident: e_1_2_7_8_2
  doi: 10.1145/358746.358762
– ident: e_1_2_7_10_2
  doi: 10.1007/s10623-008-9265-8
– ident: e_1_2_7_17_2
  doi: 10.1109/SFCS.1985.64
– ident: e_1_2_7_24_2
  doi: 10.1007/3-540-46513-8_15
– ident: e_1_2_7_7_2
  doi: 10.1023/A:1008200702849
– ident: e_1_2_7_9_2
  doi: 10.1007/3-540-57843-9_11
– ident: e_1_2_7_6_2
  doi: 10.1007/3-540-44750-4_33
– ident: e_1_2_7_14_2
  doi: 10.1007/3-540-47719-5_32
– ident: e_1_2_7_4_2
  doi: 10.1145/73007.73014
– ident: e_1_2_7_18_2
  doi: 10.1007/3-540-48970-3_15
– ident: e_1_2_7_2_2
  doi: 10.1145/359168.359176
– ident: e_1_2_7_16_2
  doi: 10.1109/AINA.2010.56
– ident: e_1_2_7_15_2
  doi: 10.1109/IEEC.2009.54
– ident: e_1_2_7_5_2
  doi: 10.1007/3-540-48285-7_10
– ident: e_1_2_7_25_2
  doi: 10.1007/978-3-642-14496-7_7
– ident: e_1_2_7_3_2
  doi: 10.1007/BF02252871
– ident: e_1_2_7_28_2
SSID ssj0056509
Score 1.9599949
Snippet Cheater detection and identification are important issues in the process of secret reconstruction. To detect and identify cheaters most of the algorithms need...
SourceID proquest
crossref
wiley
iet
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 171
SubjectTerms Algorithms
Computer information security
cryptography
Electric power distribution
generalised cheater detection
generalised cheater identification
interpolation
Lagrange interpolating polynomial
polynomials
Reconstruction
Redundancy
Redundant
secret reconstruction process
share redundancy
TCVSS
threshold changeable verifiable secret sharing
Thresholds
SummonAdditionalLinks – databaseName: Wiley Online Library Open Access
  dbid: 24P
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3dS8MwED_m9MEX5ydOp1QRH4RiuzZr-qhjw72MwSbsLaRJCgXpxtb593vXj7khTBBfm0sId7ncNXf3O4AH5UnCZZO2UU5s-8xx7FD6js0iQt_3Yq6iotlEMBzy6TQc1aBb1cIU-BDrBzfSjPy-JgWXUdGFBJ1aFGJiMjuJCXGbnvM8Kr_ed10voKPd9kfVdcxoK3lVJHNR9Z1wHdoMn38ssWWc9nB4y-_c9F5z89Nv_MvGj-Go9D6tl-K4nEDNpKfQqDo7WKWin4FTolEnS6MtRfc1jmqT5XlbqSVTbSW6zDPKRXsO7_3epPtml70VbEXwkDYz3CgtTWhi5YeKcaqhRfsdGA9dFtNGIuW6EWOx1nEnwh-zAJ0zpbkbM0kwcBdQT2epuQSLRS6X0tWKB8pnQRRyzaUK0PFUaP2juAlOxVShSuBx6n_xIfIAuB8K5IhAjgjiiCCONOFpPWVeoG7sIn6kb6XuLXcR3m8RDnoTMeiPvwnEXONuW5XEN5ZkVM-LzprXhLv1MCoiRVdkamYrpOnQsy_FUZvg5fL_fetiMO61XynBs9O--tOsazjE736RgtmCerZYmRs4UJ9Zslzc5prwBfeDCFE
  priority: 102
  providerName: Wiley-Blackwell
Title Generalised cheater detection and identification
URI http://digital-library.theiet.org/content/journals/10.1049/iet-ifs.2012.0381
https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fiet-ifs.2012.0381
https://www.proquest.com/docview/1558846583
https://www.proquest.com/docview/1620074908
Volume 8
WOSCitedRecordID wos000335178600003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 1751-8717
  dateEnd: 20140930
  omitProxy: false
  ssIdentifier: ssj0056509
  issn: 1751-8709
  databaseCode: K7-
  dateStart: 20100101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Engineering Database
  customDbUrl:
  eissn: 1751-8717
  dateEnd: 20140930
  omitProxy: false
  ssIdentifier: ssj0056509
  issn: 1751-8709
  databaseCode: M7S
  dateStart: 20100101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest advanced technologies & aerospace journals
  customDbUrl:
  eissn: 1751-8717
  dateEnd: 20140930
  omitProxy: false
  ssIdentifier: ssj0056509
  issn: 1751-8709
  databaseCode: P5Z
  dateStart: 20100101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1751-8717
  dateEnd: 20140930
  omitProxy: false
  ssIdentifier: ssj0056509
  issn: 1751-8709
  databaseCode: BENPR
  dateStart: 20100101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVWIB
  databaseName: Wiley Online Library Free Content
  customDbUrl:
  eissn: 1751-8717
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0056509
  issn: 1751-8709
  databaseCode: WIN
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://onlinelibrary.wiley.com
  providerName: Wiley-Blackwell
– providerCode: PRVWIB
  databaseName: Wiley Online Library Open Access
  customDbUrl:
  eissn: 1751-8717
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0056509
  issn: 1751-8709
  databaseCode: 24P
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1RT9swED6twAMvgzEQHazK0LSHSRZJEzfOExqoFdWkqlqZQHuxnLMjRUJpoYXfz13qdPSlPPASKfE5Ofls3-Xu_B3Ad4wN47IZ4TAsRCLDUGQmCYXMGX0_LhTmy2IT6Wik7u6ysXe4zX1aZbMn1hu1nSL7yM9J7ynSlVLFF7MHwVWjOLrqS2i0YJuRymieb1_2R-M_zV4smY_6SKSMaN2H2SqumZ2XbiHKghG72R0Yq2hNM7Woec3ofG261rpnsPdervfho7c6g1_LafIJPrjqAPaaig6BX-CfIfQo1OXc2QB5n6ZW6xZ1vlYVmMoGpfX5RbVID-HvoH9zdS18TQWBDAsppFMOrXGZKzDJUCo-O0t6O3UxmSquS0QYRbmUhbVFL6cfspSMMrQqKqRh-Lcj2KqmlTuGQOaRMiayqFJMZJpnyiqDKRmcSFo_L9oQNuOp0QOOc92Le10HvpNM0xhrEoFmEWgWQRt-rrrMlmgbm4h_8DO_5uabCM_WCIf9Gz0cTP4T6Jklbk8bCb565Up8bfi2aqYFyFEVU7npE9H02N3L8dM2xPUkeZt1PZz0u5ec2Nnrftn84RPYpW7JMsfyFLYWj0_uK-zg86KcP3ag1U3GHT_r6e53Kjqcvjqh61j-o-vtcPQCg_sJZg
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEB61KRJcKE8RKGAQcEBa1a-N14cKUUhUqyWqaJB6265n15Il5IQmBfVP9Td2xo_QXMKpB67e8XrsGc_M7sx-A_AOI8O4bEY49AsRS98XqYl9IXNG348KhXnTbCIZj9XpaXq8AVfdWRguq-xsYm2o7RR5j3yX_J4iXylV9Gn2S3DXKM6udi00GrU4dJd_aMk238u-knzfh-FoOPlyINquAgIZGFFIpxxa41JXYJyiVHx6lDxX4iJy1i4kIgyCXMrC2mKQ05IkobAErQoKaRgAjebdhK04ImZ6sLU_HB9_72y_5Peuj2DKgOyMny7zqOlu6RaiLBghnLcfIxWseMJNGl4Jcm-GyrWvG23_b1_pAdxvo2rvc_MbPIQNVz2C7a5jhdcasMfgtyjb5dxZD9kP0ah1i7oerfJMZb3StvVTtco-gR-3wvdT6FXTyj0DT-aBMiawqBKMZZKnyiqDCQXUSFFNXvTB7-SnsQVU574eP3Wd2I9TTTLVJHLNItcs8j58XN4ya9BE1hF_4GutTZmvI3y7QpgNJzobnfwl0DNL3O50GnNjyqW69OHNcpgMDGeNTOWmF0Qz4O1szg_3IaqV8t-s6-xkGO5z4eogfL7-wa_h7sHk25E-ysaHL-AeTRE39aQ70FucX7iXcAd_L8r5-av2X_Pg7LYV9xpJ62Af
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEB61BSEulKcIFDAIOCCt4tfG6wNCQBNhFUWRWqSKy3Y9uytZQk5oUhB_jV_HjB-huYRTD1y94_XKM55vvDP7DcBLTAzzshnhMPQilWEocpOGQpbMvp94hWXbbCKbTtXpaT7bgd_9WRguq-x9YuOo7Rx5j3xIuKcIK6VKhr4ri5gdTt4tvgvuIMWZ1r6dRmsiR-7XT_p9W74tDknXr-J4Mj75-El0HQYEMkmikE45tMblzmOao1R8kpRQLHMJAbeLSQijqJTSW-tHJf2eZBSioFWRl4bJ0GjeXbiWpSPF5WQz-bVHAclvoDmMKSPyOGG-zqjmw8qtROWZK5w3IhMVbWDiLg1vhLuXg-YG9Sb7__P7ug23ulg7eN9-HHdgx9V3Yb_vYxF0bu0ehB33drV0NkBGJxq1btVUqdWBqW1Q2a6qqjHk-_DlStb9APbqee0eQiDLSBkTWVQZpjIrc2WVwYzCbKRYp_QDCHtdauxo1rnbxzfdpPvTXJN-Nalfs_o1q38Ab9a3LFqOkW3Cr_la52mW2wRfbAgW4xNdTI7_CuiFpdUe9NZzacq16Qzg-XqY3A7nkkzt5hckM-JNbs4aDyBpDPTfS9fF8Tj-wOWso_jR9gc_gxtkrfpzMT16DDdphrQtMj2AvdX5hXsC1_HHqlqeP20-ugDOrtpq_wCuUGe0
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Generalised+cheater+detection+and+identification&rft.jtitle=IET+information+security&rft.au=Harn%2C+Lein&rft.date=2014-05-01&rft.issn=1751-8709&rft.eissn=1751-8717&rft.volume=8&rft.issue=3&rft.spage=171&rft.epage=171&rft_id=info:doi/10.1049%2Fiet-ifs.2012.0381&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-8709&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-8709&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-8709&client=summon