A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure

被引:0
作者
Alam, Irfan [1 ]
Alali, Amal S. [2 ]
Ali, Shakir [3 ,4 ]
Asri, Muhammad S. M. [4 ]
机构
[1] VIT Bhopal Univ, Cyber Secur & Digital Forens Div, SCAI, Sehore 466114, India
[2] Princess Nourah bint Abdulrahman Univ, Coll Sci, Dept Math Sci, POB 84428, Riyadh 11671, Saudi Arabia
[3] Aligarh Muslim Univ, Fac Sci, Dept Math, Aligarh 202002, India
[4] Univ Malaya, Inst Math Sci, Fac Sci, Kuala Lumpur 50603, Malaysia
关键词
access structure; multi-secret; hierarchy; verification; secret sharing; polynomial; MEAN CONVERGENCE;
D O I
10.3390/axioms13080515
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Sharing confidential information is a critical concern in today's world. Secret sharing schemes facilitate the sharing of secrets in a way that ensures only authorized participants (shareholders) can access the secret using their allocated shares. Hierarchical secret sharing schemes (HSSSs) build upon Shamir's scheme by organizing participants into different levels based on priority. Within HSSS, participants at each level can reconstruct the secret if a specified number, denoted as the threshold value (t), or more of them are present. Each level has a predetermined threshold value. If the number of participants falls below the threshold at any level, higher-level participants must be involved in reconstructing the secret at lower levels. Our paper proposes schemes that implement hierarchical access structures and enable the sharing of multiple secrets. Additionally, our proposed scheme includes share verification. We have analyzed potential attacks and demonstrated the scheme's resistance against them. Through security analysis and comparison with existing schemes, we highlight the novelty and superiority of our proposed approach, contributing to advancements in secure information-sharing practices.
引用
收藏
页数:18
相关论文
共 50 条
[21]   A scheme for threshold multi-secret sharing [J].
Chan, CW ;
Chang, CC .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) :1-14
[22]   Conjunctive Hierarchical Multi-Secret Sharing Scheme using Elliptic Curves [J].
Chintamani, Mohan ;
Paul, Prabal ;
Sa, Laba .
INDIAN JOURNAL OF PURE & APPLIED MATHEMATICS, 2024, 55 (04) :1456-1464
[23]   New multi-secret sharing scheme based on superincreasing sequence for level-ordered access structure [J].
Basit, Abdul ;
Chanakya, Patibandla ;
Venkaiah, V. Ch ;
Moiz, Salman Abdul .
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2020, 24 (04) :357-380
[24]   Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme [J].
Wang, Na ;
Cai, Yuanyuan ;
Fu, Junsong ;
Chen, Xiqi .
IEEE ACCESS, 2020, 8 :20799-20804
[25]   A (t, n) multi-secret sharing scheme [J].
Yang, CC ;
Chang, TY ;
Hwang, MS .
APPLIED MATHEMATICS AND COMPUTATION, 2004, 151 (02) :483-490
[26]   An efficient Boolean based multi-secret image sharing scheme [J].
Nag, Amitava ;
Singh, Jyoti Prakash ;
Singh, Amit Kumar .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (23-24) :16219-16243
[27]   An efficient Boolean based multi-secret image sharing scheme [J].
Amitava Nag ;
Jyoti Prakash Singh ;
Amit Kumar Singh .
Multimedia Tools and Applications, 2020, 79 :16219-16243
[28]   Security analysis and improvement of two verifiable multi-secret sharing schemes [J].
Yu, Jia ;
Hao, Rong ;
Cheng, Xiangguo .
International Journal of Security and Networks, 2013, 8 (04) :200-206
[29]   Verifiable secret sharing with changeable access structure [J].
Ghebleh, Mohammad ;
Kanso, Ali ;
Abuhasan, Haya .
DISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS, 2025, 17 (03)
[30]   Decentralized CRT-Based Efficient Verifiable (n, t, n) Multi-secret Sharing Scheme [J].
Wen, Wen ;
Vaidya, Binod ;
Makrakis, Dimitrios ;
Adams, Carlisle .
FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 :279-293