Multilevel threshold secret sharing based on the Chinese Remainder Theorem

被引:45
作者
Harn, Lein [1 ]
Miao Fuyou [2 ]
机构
[1] Univ Missouri Kansas City, Dept Comp Sci Elect Engn, Kansas City, MO 64110 USA
[2] Univ Sci & Technol China, Sch Comp Sci & Technol, Hefei, Anhui, Peoples R China
关键词
Multilevel secret sharing; Chinese Remainder Theorem; Asmuth-Bloom's secret sharing scheme; Threshold value; Multilevel secret sharing scheme; Cryptography;
D O I
10.1016/j.ipl.2014.04.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The (t, n) threshold secret sharing schemes (SSs) were introduced by Shamir and Blakley separately in 1979. Multilevel threshold secret sharing (MTSS) is a generalization of classical threshold SS, and it has been studied extensively in the literature. In an MTSS, shareholders are classified into different security subsets. The threshold value of a higher-level subset is smaller than the threshold value of a lower-level subset. Shareholders in each subset can recover the secret if the number of shares available is equal to or more than a threshold value. Furthermore, the share of a shareholder in a higher-level subset can be used as a share in the lower-level subset to recover the secret. Chinese Remainder Theorem (CRT) is one of popular tools used for designing SSs. For example, the Mignotte's scheme and Asmuth-Bloom's scheme are two classical (t, n) threshold SSs based on the CRT. So far, there was no CRT-based MTSS in the literature. In this paper, we propose the first MTSS based on the CRT. In our proposed scheme, one unique feature is that each shareholder needs to keep only one private share. Our proposed scheme is based on the Asmuth-Bloom's SS which is unconditionally secure. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:504 / 509
页数:6
相关论文
共 17 条
[1]  
[Anonymous], 1979, P AFIPS NAT COMP C N
[2]  
[Anonymous], 1989, J COMB MATH COMB COM
[3]   A MODULAR APPROACH TO KEY SAFEGUARDING [J].
ASMUTH, C ;
BLOOM, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :208-210
[4]  
Ballico E., 2006, P IEEE INT C TEL NET, P157
[5]  
Boudot F, 2000, LECT NOTES COMPUT SC, V1807, P431
[6]  
Cohen H., 2000, COURSE COMPUTATIONAL
[7]  
GHODOSI H, 1998, LNCS, V1438, P367
[8]  
Kaya K, 2008, LECT NOTES COMPUT SC, V5365, P414, DOI 10.1007/978-3-540-89754-5_32
[9]  
Lin C., 2009, P 5 INT C INF ASS SE
[10]  
Lu Q., 2012, P 11 IEEE INT C TRUS, P656