A New Approach to Weighted Multi-Secret Sharing

被引:0
|
作者
Zou, Xukai [1 ]
Maino, Fabio [2 ]
Bertino, Elisa [3 ]
Sui, Yan [1 ]
Wang, Kai [1 ]
Li, Feng [1 ]
机构
[1] Indiana Univ Purdue Univ, Indianapolis, IN 46202 USA
[2] Cisco Syst Inc, San Jose, CA 95134 USA
[3] Purdue Univ, W Lafayette, IN 47907 USA
关键词
Secret sharing; Shamir's secret sharing scheme; Weighted secret sharing; Chinese Remainder Theorem; Polynomial interpolation; Mignotte sequence; THRESHOLD-CHANGEABILITY; SCHEMES;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Secret sharing is important in information and network security and has broad applications in the real world. Since an elegant secret sharing mechanism was first proposed by Shamir in 1979, many schemes have appeared in literature. These schemes deal with either single or multiple secrets and their shares have either the same weight or different weights. Weighted shares mean that different shares have different capabilities in recovering the secret(s) - a more (less) weighted share needs fewer (more) other shares to recover the secret(s). In this paper, we identify a direct relation between the length (i.e., the number of bits) and the weight of shares and, based on this relation, present a new Chinese Remainder Theorem (CRT) based weighted multiple secret sharing scheme. This scheme can also be naturally applied to other cases such as sharing a single secret with same-weight shares and is remarkably simple and easy to implement. Compared to both Shamir's scheme and Mignotte's scheme the representative of existing CRT based secret sharing schemes, the new scheme is more efficient than both schemes in share computation and more efficient than Shamir's scheme (and as efficient as Mignotte's scheme) in secret recovery. One prominent advantage of the new scheme is that the sizes of shares can vary distantly to fit different requirements and constraints of various devices such as sensors, PDAs, cell phones, iPads, hence, the new scheme is able to apply to broader applications involving wireless/sensor networks and pervasive computing.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A hierarchical weighted threshold multi-secret sharing scheme
    Chang, CC
    Pan, YP
    Proceedings of the Second International Conference on Information and Management Sciences, 2002, 2 : 333 - 340
  • [2] A New Double Layer Multi-Secret Sharing Scheme
    Elavarasi Gunasekaran
    Vanitha Muthuraman
    ChinaCommunications, 2024, 21 (01) : 297 - 309
  • [3] A New (t, n) Multi-secret Sharing Scheme
    Tan, Xiao-qing
    Wang, Zhi-guo
    ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 861 - +
  • [4] A new multi-secret sharing scheme with multi-policy
    Geng Yong-Jun
    Fan Xiao-Hong
    Hong Fan
    9th International Conference on Advanced Communication Technology: Toward Network Innovation Beyond Evolution, Vols 1-3, 2007, : 1515 - 1517
  • [5] New results and applications for multi-secret sharing schemes
    Herranz, Javier
    Ruiz, Alexandre
    Saez, German
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 73 (03) : 841 - 864
  • [6] A new double layer multi-secret sharing scheme
    Gunasekaran, Elavarasi
    Muthuraman, Vanitha
    CHINA COMMUNICATIONS, 2024, 21 (01) : 287 - 309
  • [7] Design and Analysis of a New Multi-secret Sharing Scheme
    Liu Feng
    Gao Dong-Mei
    2009 ETP INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATION (FCC 2009), 2009, : 241 - 243
  • [8] New results and applications for multi-secret sharing schemes
    Javier Herranz
    Alexandre Ruiz
    Germán Sáez
    Designs, Codes and Cryptography, 2014, 73 : 841 - 864
  • [9] A novel approach for multilevel multi-secret image sharing scheme
    Kanchan Bisht
    Maroti Deshmukh
    The Journal of Supercomputing, 2021, 77 : 12157 - 12191
  • [10] A novel approach for multilevel multi-secret image sharing scheme
    Bisht, Kanchan
    Deshmukh, Maroti
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (10): : 12157 - 12191