Distributive weighted threshold secret sharing schemes

被引:14
作者
Dragan, Constantin Catalin [1 ]
Tiplea, Ferucio Laurentiu [1 ]
机构
[1] Alexandru Ioan Cuza Univ, Dept Comp Sci, Iasi, Romania
关键词
Access structure; Secret sharing scheme; Chinese remainder theorem; Entropy;
D O I
10.1016/j.ins.2016.01.019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of distributive weighted threshold access structure is introduced, which is an weighted threshold access structure where the participants are distributed on levels, the participants on the same level are assigned the same weight, and the threshold of the access structure is 1. The weight of the participants on the ith level is of the form 1/k(i) and, therefore, the ith level induces a standard threshold access structure with threshold k(i). We propose a CRT-based realization of distributive weighted threshold access structures, which is asymptotically perfect and perfect zero-knowledge. We also show that distributive weighted threshold access structures do not generally have ideal realizations. In case of just one level, our scheme can be viewed as an asymptotically perfect and perfect zero-knowledge variation of the Asmuth-Bloom secret sharing scheme. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:85 / 97
页数:13
相关论文
共 25 条
[1]  
[Anonymous], 2005, Cryptography: Theory and Practice
[2]  
[Anonymous], 1988, C THEOR APPL CRYPT, DOI 10.1007/0-387-34799-2_30
[3]   A MODULAR APPROACH TO KEY SAFEGUARDING [J].
ASMUTH, C ;
BLOOM, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :208-210
[4]   Compact sequences of co-primes and their applications to the security of CRT-based threshold schemes [J].
Barzu, Mihai ;
Tiplea, Ferucio Laurentiu ;
Dragan, Constantin Catalin .
INFORMATION SCIENCES, 2013, 240 :161-172
[5]  
Beimel A, 2005, LECT NOTES COMPUT SC, V3378, P600
[6]  
Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
[7]   Characterizing ideal weighted threshold secret sharing [J].
Beimel, Amos ;
Tassa, Tamir ;
Weinreb, Enav .
SIAM JOURNAL ON DISCRETE MATHEMATICS, 2008, 22 (01) :360-397
[8]  
Belenkiy M., 2008, TECHNICAL REPORT
[9]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[10]   A scheme for threshold multi-secret sharing [J].
Chan, CW ;
Chang, CC .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) :1-14