Multipartite Secret Sharing Based on CRT

被引:12
|
作者
Hsu, Ching-Fang [1 ]
Harn, Lein [2 ]
机构
[1] Cent China Normal Univ, Comp Sch, Wuhan 430079, Peoples R China
[2] Univ Missouri, Dept Comp Sci Elect Engn, Kansas City, MO 64110 USA
关键词
Secret sharing schemes; Multipartite access structures; Chinese remainder theorem; Asmuth-Bloom secret sharing; SCHEMES; MATROIDS;
D O I
10.1007/s11277-014-1751-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Secure communication has become more and more important for system security. Since avoiding the use of encryption one by one can introduce less computation complexity, secret sharing scheme (SSS) has been used to design many security protocols. In SSSs, several authors have studied multipartite access structures, in which the set of participants is divided into several parts and all participants in the same part play an equivalent role. Access structures realized by threshold secret sharing are the simplest multipartite access structures, i.e., unipartite access structures. Since Asmuth-Bloom scheme based on Chinese remainder theorem (CRT) was presented for threshold secret sharing, recently, threshold cryptography based on Asmuth-Bloom secret sharing were firstly proposed by Kaya et al. In this paper, we extend Asmuth-Bloom and Kaya schemes to bipartite access structures and further investigate how SSSs realizing multipartite access structures can be conducted with the CRT. Actually, every access structure is multipartite and, hence, the results in this paper can be seen as a new construction of general SSS based on the CRT. Asmuth-Bloom and Kaya schemes become the special cases of our scheme.
引用
收藏
页码:271 / 282
页数:12
相关论文
共 50 条
  • [1] Multipartite Secret Sharing Based on CRT
    Ching-Fang Hsu
    Lein Harn
    Wireless Personal Communications, 2014, 78 : 271 - 282
  • [2] Multipartite matroids and secret sharing
    HSU ChingFang
    Science Bulletin, 2010, (29) : 3261 - 3266
  • [3] On modular (CRT-based) secret sharing
    Shenets, Nikolay N.
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (04): : 765 - 782
  • [4] Multipartite matroids and secret sharing
    Hsu ChingFang
    Tang XueMing
    Cheng Qi
    Xiao HaiJun
    CHINESE SCIENCE BULLETIN, 2010, 55 (29): : 3261 - 3266
  • [5] Ideal Multipartite Secret Sharing Schemes
    Oriol Farràs
    Jaume Martí-Farré
    Carles Padró
    Journal of Cryptology, 2012, 25 : 434 - 463
  • [6] Ideal multipartite secret sharing schemes
    Farras, Oriol
    Marti-Farre, Jaume
    Padro, Carles
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 448 - +
  • [7] Homomorphic extensions of CRT-based secret sharing
    Ersoy, Oguzhan
    Pedersen, Thomas Brochmann
    Anarim, Emin
    DISCRETE APPLIED MATHEMATICS, 2020, 285 (285) : 317 - 329
  • [8] Multipartite secret sharing by bivariate interpolation
    Tassa, Tamir
    Dyn, Nira
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 288 - 299
  • [9] Multipartite Secret Sharing by Bivariate Interpolation
    Tassa, Tamir
    Dyn, Nira
    JOURNAL OF CRYPTOLOGY, 2009, 22 (02) : 227 - 258
  • [10] Multipartite Secret Sharing by Bivariate Interpolation
    Tamir Tassa
    Nira Dyn
    Journal of Cryptology, 2009, 22 : 227 - 258