A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure

被引:0
作者
Alam, Irfan [1 ]
Alali, Amal S. [2 ]
Ali, Shakir [3 ,4 ]
Asri, Muhammad S. M. [4 ]
机构
[1] VIT Bhopal Univ, Cyber Secur & Digital Forens Div, SCAI, Sehore 466114, India
[2] Princess Nourah bint Abdulrahman Univ, Coll Sci, Dept Math Sci, POB 84428, Riyadh 11671, Saudi Arabia
[3] Aligarh Muslim Univ, Fac Sci, Dept Math, Aligarh 202002, India
[4] Univ Malaya, Inst Math Sci, Fac Sci, Kuala Lumpur 50603, Malaysia
关键词
access structure; multi-secret; hierarchy; verification; secret sharing; polynomial; MEAN CONVERGENCE;
D O I
10.3390/axioms13080515
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Sharing confidential information is a critical concern in today's world. Secret sharing schemes facilitate the sharing of secrets in a way that ensures only authorized participants (shareholders) can access the secret using their allocated shares. Hierarchical secret sharing schemes (HSSSs) build upon Shamir's scheme by organizing participants into different levels based on priority. Within HSSS, participants at each level can reconstruct the secret if a specified number, denoted as the threshold value (t), or more of them are present. Each level has a predetermined threshold value. If the number of participants falls below the threshold at any level, higher-level participants must be involved in reconstructing the secret at lower levels. Our paper proposes schemes that implement hierarchical access structures and enable the sharing of multiple secrets. Additionally, our proposed scheme includes share verification. We have analyzed potential attacks and demonstrated the scheme's resistance against them. Through security analysis and comparison with existing schemes, we highlight the novelty and superiority of our proposed approach, contributing to advancements in secure information-sharing practices.
引用
收藏
页数:18
相关论文
共 50 条
[41]   A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing [J].
Pang, LJ ;
Wang, YM .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) :840-848
[42]   Efficient Multi-secret Sharing Scheme Using Room Square [J].
Li, Ming-Jheng ;
Chang, Ying-Hsuan ;
Juan, Justie Su-Tzu .
2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, :260-266
[43]   Identity (ID)-based threshold multi-secret sharing scheme [J].
Pang, Liao-Jun ;
Pei, Qing-Qi ;
Jiao, Li-Cheng ;
Wang, Yu-Min .
Ruan Jian Xue Bao/Journal of Software, 2008, 19 (10) :2739-2745
[44]   A Verifiable Secret Sharing Scheme without Using Multi-Party Computations [J].
Makino, Takumi ;
Kamidoi, Yoko ;
Wakabayashi, Shin'ichi .
2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, :845-850
[45]   An extensible cheat-proofing multi-secret sharing scheme with low computation complexity [J].
Wu, Yinfeng ;
Huang, Liping ;
Wang, Xiao ;
Yu, Ning .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (06) :1042-1048
[46]   On the Construction and Analysis of Verifiable Multi-secret Sharing Based on Non-homogeneous Linear Recursion [J].
Zhang, Ben-Hui ;
Tang, Yuan-Sheng .
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (03) :749-763
[47]   A quantum secret sharing scheme on access structure [J].
Qin, Huawang ;
Zhu, Xiaohua ;
Dai, Yuewei .
JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2016, 39 (02) :186-191
[48]   A Lightweight Public Verifiable Multi Secret Sharing Scheme Using Short Integer Solution [J].
Dehkordi, Massoud Hadian ;
Ghasemi, Reza .
WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) :1459-1469
[49]   A Lightweight Public Verifiable Multi Secret Sharing Scheme Using Short Integer Solution [J].
Massoud Hadian Dehkordi ;
Reza Ghasemi .
Wireless Personal Communications, 2016, 91 :1459-1469
[50]   Authenticable quantum multi-secret sharing scheme based on monotone span program [J].
Lele Li ;
Zhaowei Han ;
Feiting Guan .
Quantum Information Processing, 22 (9)