A New Approach to Weighted Multi-Secret Sharing

被引:0
|
作者
Zou, Xukai [1 ]
Maino, Fabio [2 ]
Bertino, Elisa [3 ]
Sui, Yan [1 ]
Wang, Kai [1 ]
Li, Feng [1 ]
机构
[1] Indiana Univ Purdue Univ, Indianapolis, IN 46202 USA
[2] Cisco Syst Inc, San Jose, CA 95134 USA
[3] Purdue Univ, W Lafayette, IN 47907 USA
关键词
Secret sharing; Shamir's secret sharing scheme; Weighted secret sharing; Chinese Remainder Theorem; Polynomial interpolation; Mignotte sequence; THRESHOLD-CHANGEABILITY; SCHEMES;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Secret sharing is important in information and network security and has broad applications in the real world. Since an elegant secret sharing mechanism was first proposed by Shamir in 1979, many schemes have appeared in literature. These schemes deal with either single or multiple secrets and their shares have either the same weight or different weights. Weighted shares mean that different shares have different capabilities in recovering the secret(s) - a more (less) weighted share needs fewer (more) other shares to recover the secret(s). In this paper, we identify a direct relation between the length (i.e., the number of bits) and the weight of shares and, based on this relation, present a new Chinese Remainder Theorem (CRT) based weighted multiple secret sharing scheme. This scheme can also be naturally applied to other cases such as sharing a single secret with same-weight shares and is remarkably simple and easy to implement. Compared to both Shamir's scheme and Mignotte's scheme the representative of existing CRT based secret sharing schemes, the new scheme is more efficient than both schemes in share computation and more efficient than Shamir's scheme (and as efficient as Mignotte's scheme) in secret recovery. One prominent advantage of the new scheme is that the sizes of shares can vary distantly to fit different requirements and constraints of various devices such as sensors, PDAs, cell phones, iPads, hence, the new scheme is able to apply to broader applications involving wireless/sensor networks and pervasive computing.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] A New Verifiable Multi-secret Sharing Scheme Realizing Adversary Structure
    Masoud Hadian Dehkordi
    Yousof Farzaneh
    Wireless Personal Communications, 2015, 82 : 1749 - 1758
  • [42] A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps
    Ziba Eslami
    Saideh Kabiri Rad
    Wireless Personal Communications, 2012, 63 : 459 - 467
  • [43] A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps
    Eslami, Ziba
    Rad, Saideh Kabiri
    WIRELESS PERSONAL COMMUNICATIONS, 2012, 63 (02) : 459 - 467
  • [44] Secure multi-level threshold multi-secret sharing
    Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
    Qinghua Daxue Xuebao, 2007, 4 (592-594):
  • [45] Multi-Secret Image Sharing Scheme by Boolean Operations
    Chen, Chien-Chang
    Lin, Cheng-Shian
    Chen, Jia-Zhan
    2022 IEEE 18TH INTERNATIONAL COLLOQUIUM ON SIGNAL PROCESSING & APPLICATIONS (CSPA 2022), 2022, : 397 - 402
  • [46] Consideration for multi-threshold multi-secret sharing schemes
    Waseda, Atsushi
    Soshi, Masakazu
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2012), 2012, : 265 - 269
  • [47] Secure secret reconstruction and multi-secret sharing schemes with unconditional security
    Harn, Lein
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (03) : 567 - 573
  • [48] Multi-secret sharing threshold visual cryptography scheme
    Yu, Bin
    Xu, Xiaohui
    Fang, Liguo
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 815 - +
  • [49] A generalized multi-secret sharing scheme to identify cheaters
    Huang, Zhi-Xiong
    Li, Qun-Hui
    Wei, Ren-Yong
    Li, Zhi-Yong
    Tiedao Xuebao/Journal of the China Railway Society, 2007, 29 (06): : 52 - 56
  • [50] Verifiable multi-secret sharing based on LFSR sequences
    Hu, Chunqiang
    Liao, Xiaofeng
    Cheng, Xiuzhen
    THEORETICAL COMPUTER SCIENCE, 2012, 445 : 52 - 62