A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure

被引:1
作者
Alam, Irfan [1 ]
Alali, Amal S. [2 ]
Ali, Shakir [3 ,4 ]
Asri, Muhammad S. M. [4 ]
机构
[1] VIT Bhopal Univ, Cyber Secur & Digital Forens Div, SCAI, Sehore 466114, India
[2] Princess Nourah bint Abdulrahman Univ, Coll Sci, Dept Math Sci, POB 84428, Riyadh 11671, Saudi Arabia
[3] Aligarh Muslim Univ, Fac Sci, Dept Math, Aligarh 202002, India
[4] Univ Malaya, Inst Math Sci, Fac Sci, Kuala Lumpur 50603, Malaysia
关键词
access structure; multi-secret; hierarchy; verification; secret sharing; polynomial; MEAN CONVERGENCE;
D O I
10.3390/axioms13080515
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Sharing confidential information is a critical concern in today's world. Secret sharing schemes facilitate the sharing of secrets in a way that ensures only authorized participants (shareholders) can access the secret using their allocated shares. Hierarchical secret sharing schemes (HSSSs) build upon Shamir's scheme by organizing participants into different levels based on priority. Within HSSS, participants at each level can reconstruct the secret if a specified number, denoted as the threshold value (t), or more of them are present. Each level has a predetermined threshold value. If the number of participants falls below the threshold at any level, higher-level participants must be involved in reconstructing the secret at lower levels. Our paper proposes schemes that implement hierarchical access structures and enable the sharing of multiple secrets. Additionally, our proposed scheme includes share verification. We have analyzed potential attacks and demonstrated the scheme's resistance against them. Through security analysis and comparison with existing schemes, we highlight the novelty and superiority of our proposed approach, contributing to advancements in secure information-sharing practices.
引用
收藏
页数:18
相关论文
共 60 条
[1]  
asecuritysite, Security and So Many Things
[2]   A MODULAR APPROACH TO KEY SAFEGUARDING [J].
ASMUTH, C ;
BLOOM, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :208-210
[3]   Hierarchical secret sharing in ad hoc networks through Birkhoff interpolation [J].
Ballico, E. ;
Boato, G. ;
Fontanari, C. ;
Granelli, F. .
ADVANCES IN COMPUTER, INFORMATION, AND SYSTEMS SCIENCES AND ENGINEERING, 2006, :157-+
[4]  
Banerjee S., 2018, P 2018 4 INT C REC A, P1
[5]  
Basit A, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), P557, DOI 10.1109/CCAA.2017.8229863
[6]   A novel approach for multilevel multi-secret image sharing scheme [J].
Bisht, Kanchan ;
Deshmukh, Maroti .
JOURNAL OF SUPERCOMPUTING, 2021, 77 (10) :12157-12191
[7]  
Blakley G.R., 1979, P AFIPS 1979 NATL CO, P313, DOI DOI 10.1109/MARK.1979.8817296
[8]   GRAPH DECOMPOSITIONS AND SECRET SHARING SCHEMES [J].
BLUNDO, C ;
DESANTIS, A ;
STINSON, DR ;
VACCARO, U .
JOURNAL OF CRYPTOLOGY, 1995, 8 (01) :39-64
[9]  
Brickell ErnestF., 1989, J COMBIN MATH COMBIN, V6, P105, DOI [10.1007/3-540-46885-4_45, DOI 10.1007/3-540-46885-4_45]
[10]  
Buchanan W.J., 2024, Shamir Secret Sharing (SSS)