Multipartite Secret Sharing Based on CRT

被引:12
|
作者
Hsu, Ching-Fang [1 ]
Harn, Lein [2 ]
机构
[1] Cent China Normal Univ, Comp Sch, Wuhan 430079, Peoples R China
[2] Univ Missouri, Dept Comp Sci Elect Engn, Kansas City, MO 64110 USA
关键词
Secret sharing schemes; Multipartite access structures; Chinese remainder theorem; Asmuth-Bloom secret sharing; SCHEMES; MATROIDS;
D O I
10.1007/s11277-014-1751-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Secure communication has become more and more important for system security. Since avoiding the use of encryption one by one can introduce less computation complexity, secret sharing scheme (SSS) has been used to design many security protocols. In SSSs, several authors have studied multipartite access structures, in which the set of participants is divided into several parts and all participants in the same part play an equivalent role. Access structures realized by threshold secret sharing are the simplest multipartite access structures, i.e., unipartite access structures. Since Asmuth-Bloom scheme based on Chinese remainder theorem (CRT) was presented for threshold secret sharing, recently, threshold cryptography based on Asmuth-Bloom secret sharing were firstly proposed by Kaya et al. In this paper, we extend Asmuth-Bloom and Kaya schemes to bipartite access structures and further investigate how SSSs realizing multipartite access structures can be conducted with the CRT. Actually, every access structure is multipartite and, hence, the results in this paper can be seen as a new construction of general SSS based on the CRT. Asmuth-Bloom and Kaya schemes become the special cases of our scheme.
引用
收藏
页码:271 / 282
页数:12
相关论文
共 50 条
  • [21] Ideal secret sharing schemes with multipartite access structures
    Ng, SL
    IEE PROCEEDINGS-COMMUNICATIONS, 2006, 153 (02): : 165 - 168
  • [22] Probabilistic Secret Sharing Schemes for Multipartite Access Structures
    Wang, Xianfang
    Fu, Fang-Wei
    Guang, Xuan
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (04) : 856 - 862
  • [23] Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures
    Reo Eriguchi
    Noboru Kunihiro
    Koji Nuida
    Designs, Codes and Cryptography, 2023, 91 : 1751 - 1778
  • [24] Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures
    Eriguchi, Reo
    Kunihiro, Noboru
    Nuida, Koji
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (05) : 1751 - 1778
  • [25] A family of non-representable multipartite secret sharing matroids
    Xu, Jing-Fang
    Cui, Guo-Hua
    Cheng, Qi
    Zhang, Zhi
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2010, 38 (01): : 117 - 122
  • [26] CP-PSIS: CRT and polynomial-based progressive secret image sharing
    Xiong, Lizhi
    Han, Xiao
    Yang, Ching-Nung
    SIGNAL PROCESSING, 2021, 185
  • [27] A CRT-based verifiable secret sharing scheme secure against unbounded adversaries
    Ersoy, Oguzhan
    Pedersen, Thomas Brochmann
    Kaya, Kamer
    Selcuk, Ali Aydin
    Anarim, Emin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4416 - 4427
  • [28] New Secret Sharing Scheme for Multipartite Access Structures with Threshold Changeability
    Tentu, Appala Naidu
    Mahapatra, Banita
    Venkaiah, V. Ch.
    Prasad, V. Kamakshi
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1910 - 1916
  • [29] Secret Information Sharing using Multipartite Entanglement in Monty Hall Game
    Kaur, Hargeet
    Shah, Kavit
    Swain, Debabrata
    Shah, Kaushal
    PHOTONIC NETWORK COMMUNICATIONS, 2024, 48 (1-3) : 18 - 25
  • [30] Multipartite quantum secret sharing using not-so-weak qubits
    Choi, Yun Jin
    Park, Young-Jai
    Kim, Chil-Min
    JOURNAL OF THE KOREAN PHYSICAL SOCIETY, 2007, 51 (01) : 4 - 9