ABSTRACT
The threshold scheme, the monotone circuit construction, and the vector space construction are some of the well-known secret sharing schemes in cryptography. The threshold and monotone circuit secret sharing schemes are fairly easy to construct for any given access structure Γ. The construction of a secret sharing scheme realizing a given access structure Γ with Vector Space Construction requires the existence of a function ϕ from a set of participants into a vector space, that is, ϕ: P → (Zp)d. This function ϕ must satisfy certain conditions. There is no known algorithm to construct such a function ϕ in general. Constructions are mainly done by trial and error. In this paper, we develop polynomial algorithms to construct ϕ functions for vector space secret sharing scheme realizing certain types of access structures. Some examples are given to illustrate the algorithms.
- M. Atici, Secret Sharing Scheme: Vector Space Secret Sharing Scheme and φ Function, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, August 26--29, Istanbul-Turkey. Google ScholarDigital Library
- J. Benaloh and J. Leichter, Generalized secret sharing and monotone functions, Lecture notes in Computer Science, 403(1990), pp. 27--35. Google ScholarDigital Library
- G. R. Blakley, Safegarding crytographic keys, Federal information Processing Standard Conference Proceedings, 48(1979), pp. 313--317.Google Scholar
- E. F. Brickell(Ed), Advances in Cryptology-CRYPTO'92 Proceedings, Lecture Notes in Computer Science, vol. 740, Springer, 1993.Google Scholar
- M. Ito, A. Saito, and T. Hishizeki, Secret sharing scheme realizing general access structure, Proceedings IEEE Globecom '87(1987), pp. 99--102.Google Scholar
- A. Shamir, How to share a secret, Communication of the ACM, 22(1979), pp. 612--613. Google ScholarDigital Library
- D. R. Stinson, Crtptography Theory and Practice, Chapman and Hall/CRC, 2006. Google ScholarDigital Library
Index Terms
- Vector space secret sharing and an efficient algorithm to construct a ϕ function
Recommendations
Efficient Algorithm to Construct Perfect Secret Sharing Scheme for a Given Access Structure
CISRC '16: Proceedings of the 11th Annual Cyber and Information Security Research ConferenceThe threshold scheme, the monotone circuit construction, and the vector space construction are some of the well-known secret sharing schemes in cryptography. The threshold and monotone circuit secret sharing schemes are fairly easy to construct for any ...
On a Fast (k,n)-Threshold Secret Sharing Scheme
In Shamir's ( k, n )-threshold secret sharing scheme (threshold scheme) [1], a heavy computational cost is required to make n shares and recover the secret from k shares. As a solution to this problem, several fast threshold schemes have been proposed. ...
A New (k,n)-Threshold Secret Sharing Scheme and Its Extension
ISC '08: Proceedings of the 11th international conference on Information SecurityIn Shamir's (<em>k</em>,<em>n</em>)-threshold secret sharing scheme (threshold scheme), a heavy computational cost is required to make <em>n</em>shares and recover the secret. As a solution to this problem, several fast threshold schemes have been ...
Comments