A New Approach to Weighted Multi-Secret Sharing

被引:0
|
作者
Zou, Xukai [1 ]
Maino, Fabio [2 ]
Bertino, Elisa [3 ]
Sui, Yan [1 ]
Wang, Kai [1 ]
Li, Feng [1 ]
机构
[1] Indiana Univ Purdue Univ, Indianapolis, IN 46202 USA
[2] Cisco Syst Inc, San Jose, CA 95134 USA
[3] Purdue Univ, W Lafayette, IN 47907 USA
关键词
Secret sharing; Shamir's secret sharing scheme; Weighted secret sharing; Chinese Remainder Theorem; Polynomial interpolation; Mignotte sequence; THRESHOLD-CHANGEABILITY; SCHEMES;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Secret sharing is important in information and network security and has broad applications in the real world. Since an elegant secret sharing mechanism was first proposed by Shamir in 1979, many schemes have appeared in literature. These schemes deal with either single or multiple secrets and their shares have either the same weight or different weights. Weighted shares mean that different shares have different capabilities in recovering the secret(s) - a more (less) weighted share needs fewer (more) other shares to recover the secret(s). In this paper, we identify a direct relation between the length (i.e., the number of bits) and the weight of shares and, based on this relation, present a new Chinese Remainder Theorem (CRT) based weighted multiple secret sharing scheme. This scheme can also be naturally applied to other cases such as sharing a single secret with same-weight shares and is remarkably simple and easy to implement. Compared to both Shamir's scheme and Mignotte's scheme the representative of existing CRT based secret sharing schemes, the new scheme is more efficient than both schemes in share computation and more efficient than Shamir's scheme (and as efficient as Mignotte's scheme) in secret recovery. One prominent advantage of the new scheme is that the sizes of shares can vary distantly to fit different requirements and constraints of various devices such as sensors, PDAs, cell phones, iPads, hence, the new scheme is able to apply to broader applications involving wireless/sensor networks and pervasive computing.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] On Novel Verifiable Multi-Secret Sharing Scheme
    Wang, Jian
    Liu, Yanheng
    Wang, Yanxi
    ADVANCED SCIENCE LETTERS, 2011, 4 (11-12) : 3709 - 3715
  • [32] Sharing Multi-secret Based on Circle Properties
    Ge, Lina
    Tang, Shaohua
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 340 - 344
  • [33] A (t, n) multi-secret sharing scheme
    Yang, CC
    Chang, TY
    Hwang, MS
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 151 (02) : 483 - 490
  • [34] A Hierarchical Threshold Multi-secret Sharing Scheme
    Shi Runhua
    Zhong Hong
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 231 - 234
  • [35] DNA based Multi-Secret Image Sharing
    Anbarasi, L. Jani
    Mala, G. S. Anandha
    Narendra, Modigari
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 1794 - 1801
  • [36] A practical verifiable multi-secret sharing scheme
    Zhao, Jianjie
    Zhang, Jianzhong
    Zhao, Rong
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 138 - 141
  • [37] Verifiable threshold multi-secret sharing scheme
    Pang, Liao-Jun
    Li, Hui-Xian
    Li, Zhi-Jie
    Wang, Yu-Min
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2008, 40 (09): : 1462 - 1465
  • [38] Design of a new efficient and secure multi-secret images sharing scheme
    Kamel Mohamed Faraoun
    Multimedia Tools and Applications, 2017, 76 : 6247 - 6261
  • [39] Design of a new efficient and secure multi-secret images sharing scheme
    Faraoun, Kamel Mohamed
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (05) : 6247 - 6261
  • [40] A New Verifiable Multi-secret Sharing Scheme Realizing Adversary Structure
    Dehkordi, Masoud Hadian
    Farzaneh, Yousof
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (03) : 1749 - 1758