A Modified Shamir Secret Sharing Scheme With Efficient Encoding

被引:6
|
作者
Hineman, Allyson [1 ]
Blaum, Mario [2 ]
机构
[1] SUNY Coll Fredonia, Dept Math Sci, Fredonia, NY 14063 USA
[2] IBM Res Div Almaden, San Jose, CA 95032 USA
关键词
Codes; Encoding; Cryptography; Complexity theory; Systematics; Reed-Solomon codes; Decoding; Shamir secret sharing; threshold secret sharing; MDS codes; array codes; erasure correction; ARRAY CODES; EVENODD;
D O I
10.1109/LCOMM.2022.3144375
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Shamir secret sharing (SSS) scheme requires a Maximum Distance Separable (MDS) code, and in its most common implementation, a Reed-Solomon (RS) code is used. In this letter, we observe that the encoding procedure can be made simpler and faster by dropping the MDS condition and specifying the possible symbols that can be shared. In particular, the process can be made even faster by using array codes based on exclusive-or (XOR) operations instead of RS codes.
引用
收藏
页码:758 / 762
页数:5
相关论文
共 50 条
  • [21] Medical image security and EPR hiding using Shamir's secret sharing scheme
    Ulutas, Mustafa
    Ulutas, Guzin
    Nabiyev, Vasif V.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (03) : 341 - 353
  • [22] Participants Increasing for Shamir's Polynomial-based Secret Image Sharing Scheme
    Ding, Wanmeng
    Liu, Kesheng
    Liu, Lintao
    Yan, Xuehu
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 32 - 36
  • [23] Security limitations of Shamir's secret sharing
    Lemnouar, Noui
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (04): : 977 - 989
  • [24] Secret Sharing Scheme with Efficient Cheating Detection
    Becerra, Daniel
    Vega, Gerardo
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEMS & SECURITY (NISS19), 2019,
  • [25] An Efficient Halftone Visual Secret Sharing Scheme
    Arya, K. V.
    Rishiwal, Vinay
    Yadav, Arun Kumar
    2014 9TH INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), 2014, : 70 - 74
  • [26] Cloud Computing Security in Multi-clouds using Shamir's Secret Sharing Scheme
    Pundkar, Sumedh N.
    Shekokar, Narendra
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 392 - 395
  • [27] Distributed Remote E-Voting System Based on Shamir's Secret Sharing Scheme
    Tejedor-Romero, Marino
    Orden, David
    Marsa-Maestre, Ivan
    Junquera-Sanchez, Javier
    Gimenez-Guzman, Jose Manuel
    ELECTRONICS, 2021, 10 (24)
  • [28] Research and Application Based on A. Shamir's (t, n) Threshold Secret Sharing Scheme
    Li, Quandong
    Zhou, Yanhui
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 671 - 674
  • [29] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Wang, Daoshun
    Yi, Feng
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
  • [30] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Daoshun Wang
    Feng Yi
    EURASIP Journal on Advances in Signal Processing, 2010