Efficient Multi-secret Sharing Scheme Using Room Square

被引:2
作者
Li, Ming-Jheng [1 ]
Chang, Ying-Hsuan [1 ]
Juan, Justie Su-Tzu [1 ]
机构
[1] Natl Chi Nan Univ, Dept Comp Sci & Informat Engn, Puli 54561, Nantou, Taiwan
来源
2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS | 2009年
关键词
secret sharing scheme; room square; multi-use; multi-secret;
D O I
10.1109/SSIRI.2009.23
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In 1979, secret sharing scheme was first proposed by Shamir. In a secret sharing scheme, each participant receives a secret share in such a way that only authorized subsets can reconstruct the secret. Compare with Shamir's scheme, Juan and Huang proposed an efficient secret sharing scheme from room square in 2005. Their scheme gave a practical algorithm to reduce the computation complexity by using room square, and obtained as (n - 1, n)-threshold secret sharing scheme. However, there is not any (t, n) -threshold secret sharing scheme for t <= n - 2 with more efficient than Shamir's scheme has been proposed. For this reason, this paper utilizes the characteristic of cycle to design four (t, n)-threshold secret sharing schemes for t = n - 2. These proposed schemes are not only more efficient than previous related works in the computational complexity, but also with the information rate is approximated optimal value 1. In addition, we combine the proposed scheme and the property of room square to present a new multi-secret sharing scheme in this paper.
引用
收藏
页码:260 / 266
页数:7
相关论文
共 10 条
[1]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[2]  
Chaudhry G., 1996, Proc. of DMTCS'96, P158
[3]  
CHAUDHRY GR, 1997, B I COMBIN ITS APPL, V20, P90
[4]  
CHAUDHRY GR, 1992, J CRYPTOL, V5, P153
[5]  
Juan JST, 2005, Third International Conference on Information Technology and Applications, Vol 2, Proceedings, P477
[6]   The state of elliptic curve cryptography [J].
Koblitz, N ;
Menezes, A ;
Vanstone, S .
DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) :173-193
[7]  
Pang Liaojun, 2006, Wuhan University Journal of Natural Sciences, V11, P1649, DOI 10.1007/BF02831842
[8]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[9]  
Stinson D. R., 2018, Cryptography Theory and Practice
[10]  
Tsai Jennifer Hui-Chan, 2008, Proceedings of the 2008 International Conference on Foundations of Computer Science (FCS 2008), P106