A Modified Shamir Secret Sharing Scheme With Efficient Encoding

被引:6
作者
Hineman, Allyson [1 ]
Blaum, Mario [2 ]
机构
[1] SUNY Coll Fredonia, Dept Math Sci, Fredonia, NY 14063 USA
[2] IBM Res Div Almaden, San Jose, CA 95032 USA
关键词
Codes; Encoding; Cryptography; Complexity theory; Systematics; Reed-Solomon codes; Decoding; Shamir secret sharing; threshold secret sharing; MDS codes; array codes; erasure correction; ARRAY CODES; EVENODD;
D O I
10.1109/LCOMM.2022.3144375
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Shamir secret sharing (SSS) scheme requires a Maximum Distance Separable (MDS) code, and in its most common implementation, a Reed-Solomon (RS) code is used. In this letter, we observe that the encoding procedure can be made simpler and faster by dropping the MDS condition and specifying the possible symbols that can be shared. In particular, the process can be made even faster by using array codes based on exclusive-or (XOR) operations instead of RS codes.
引用
收藏
页码:758 / 762
页数:5
相关论文
共 25 条
  • [1] EVENODD - AN EFFICIENT SCHEME FOR TOLERATING DOUBLE-DISK FAILURES IN RAID ARCHITECTURES
    BLAUM, M
    BRADY, J
    BRUCK, J
    MENON, J
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 1995, 44 (02) : 192 - 202
  • [2] NEW ARRAY CODES FOR MULTIPLE PHASED BURST CORRECTION
    BLAUM, M
    ROTH, RM
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (01) : 66 - 77
  • [3] MDS array codes with independent parity symbols
    Blaum, M
    Bruck, J
    Vardy, A
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1996, 42 (02) : 529 - 542
  • [4] A family of MDS array codes with minimal number of encoding operations
    Blaum, Mario
    [J]. 2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, : 2784 - 2788
  • [5] Array Codes With Local Properties
    Blaum, Mario
    Hetzler, Steven R.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (06) : 3675 - 3690
  • [6] Chen L, 2016, U. S. Patent, Patent No. [WO2016 048 297, 2016048297]
  • [7] Efficient, XOR-Based, Ideal (t,n) - threshold Schemes
    Chen, Liqun
    Laing, Thalia M.
    Martin, Keith M.
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 467 - 483
  • [8] Chunli Lv, 2010, Proceedings of the 2010 Fourth International Conference on Network and System Security (NSS 2010), P136, DOI 10.1109/NSS.2010.82
  • [9] Corbett P, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE 3RD USENIX CONFERENCE ON FILE AND STORAGE TECHNOLOGIES, P1
  • [10] ON DECODING BCH CODES
    FORNEY, GD
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1965, 11 (04) : 549 - 557