A Modified Shamir Secret Sharing Scheme With Efficient Encoding

被引:6
|
作者
Hineman, Allyson [1 ]
Blaum, Mario [2 ]
机构
[1] SUNY Coll Fredonia, Dept Math Sci, Fredonia, NY 14063 USA
[2] IBM Res Div Almaden, San Jose, CA 95032 USA
关键词
Codes; Encoding; Cryptography; Complexity theory; Systematics; Reed-Solomon codes; Decoding; Shamir secret sharing; threshold secret sharing; MDS codes; array codes; erasure correction; ARRAY CODES; EVENODD;
D O I
10.1109/LCOMM.2022.3144375
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Shamir secret sharing (SSS) scheme requires a Maximum Distance Separable (MDS) code, and in its most common implementation, a Reed-Solomon (RS) code is used. In this letter, we observe that the encoding procedure can be made simpler and faster by dropping the MDS condition and specifying the possible symbols that can be shared. In particular, the process can be made even faster by using array codes based on exclusive-or (XOR) operations instead of RS codes.
引用
收藏
页码:758 / 762
页数:5
相关论文
共 50 条
  • [1] THE BREADTH OF SHAMIR SECRET-SHARING SCHEME
    DAWSON, E
    DONOVAN, D
    COMPUTERS & SECURITY, 1994, 13 (01) : 69 - 78
  • [2] Several generalizations of Shamir's secret sharing scheme
    Lai, CP
    Ding, CS
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2004, 15 (02) : 445 - 458
  • [3] Sound Steganography using Shamir Secret Sharing Scheme
    Kacamak, Salajdin
    Uka, Arban
    2017 6TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2017, : 217 - 220
  • [4] Protecting AES with Shamir's Secret Sharing Scheme
    Goubin, Louis
    Martinelli, Ange
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 79 - 94
  • [5] An Efficient Privacy-Preserving Authentication Scheme Based on Shamir Secret Sharing for VANETs
    Qi, Jiayu
    Gao, Tianhan
    Zhao, Cong
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2023, 2023, 177 : 138 - 148
  • [6] Hardware implementation of secure Shamir's secret sharing scheme
    Luo, Pei
    Lin, Andy Yu-Lun
    Wang, Zhen
    Karpovsky, Mark
    2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON HIGH-ASSURANCE SYSTEMS ENGINEERING (HASE), 2014, : 193 - 200
  • [7] Single Secret Sharing Scheme Using Chinese Remainder Theorem, Modified Shamir's Scheme and XOR Operation
    Pande, Dinesh
    Rawat, Arjun Singh
    Deshmukh, Maroti
    Singh, Maheep
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 130 (02) : 957 - 985
  • [8] Dynamic threshold and cheater resistance for Shamir secret sharing scheme
    Tartary, Christophe
    Wang, Huaxiong
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 103 - 117
  • [9] Single Secret Sharing Scheme Using Chinese Remainder Theorem, Modified Shamir’s Scheme and XOR Operation
    Dinesh Pande
    Arjun Singh Rawat
    Maroti Deshmukh
    Maheep Singh
    Wireless Personal Communications, 2023, 130 : 957 - 985
  • [10] A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing
    Pang, LJ
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 840 - 848