A Modified Shamir Secret Sharing Scheme With Efficient Encoding

被引:6
|
作者
Hineman, Allyson [1 ]
Blaum, Mario [2 ]
机构
[1] SUNY Coll Fredonia, Dept Math Sci, Fredonia, NY 14063 USA
[2] IBM Res Div Almaden, San Jose, CA 95032 USA
关键词
Codes; Encoding; Cryptography; Complexity theory; Systematics; Reed-Solomon codes; Decoding; Shamir secret sharing; threshold secret sharing; MDS codes; array codes; erasure correction; ARRAY CODES; EVENODD;
D O I
10.1109/LCOMM.2022.3144375
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Shamir secret sharing (SSS) scheme requires a Maximum Distance Separable (MDS) code, and in its most common implementation, a Reed-Solomon (RS) code is used. In this letter, we observe that the encoding procedure can be made simpler and faster by dropping the MDS condition and specifying the possible symbols that can be shared. In particular, the process can be made even faster by using array codes based on exclusive-or (XOR) operations instead of RS codes.
引用
收藏
页码:758 / 762
页数:5
相关论文
共 50 条
  • [41] Perfectly Secure Shamir's Secret Sharing Scheme for Privacy Preserving Image Processing Over Cloud
    Sadhya, Debanjan
    Agarwal, Akshay
    Raman, Balasubramanian
    ELEVENTH INDIAN CONFERENCE ON COMPUTER VISION, GRAPHICS AND IMAGE PROCESSING (ICVGIP 2018), 2018,
  • [42] Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages
    Maji, Hemanta K.
    Hai H Nguyen
    Paskin-Cherniavsky, Anat
    Suad, Tom
    Wang, Mingyuan
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II, 2021, 12697 : 344 - 374
  • [43] Shamir Secret Sharing Scheme with Dynamic Access Structure (SSSDAS): case study on nuclear power plant
    Thiyagarajan, P.
    Thandra, Prasanth Kumar
    Rajan, J.
    Satyamurthy, S. A. V.
    Aghila, G.
    KERNTECHNIK, 2015, 80 (02) : 150 - +
  • [44] Secrecy Computation without Changing Polynomial Degree in Shamir's (K, N) Secret Sharing Scheme
    Shingu, Takeshi
    Iwamura, Keiichi
    Kaneda, Kitahiro
    DCNET: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 1, 2016, : 89 - 94
  • [45] Improved Universal Thresholdizer from Iterative Shamir Secret Sharing
    Cheon, Jung Hee
    Cho, Wonhee
    Kim, Jiseung
    JOURNAL OF CRYPTOLOGY, 2025, 38 (01)
  • [46] Securing graph steganography by using Shamir's secret sharing
    Sari, A. N.
    INTERNATIONAL CONFERENCE ON INNOVATION IN ENGINEERING AND VOCATIONAL EDUCATION 2019 (ICIEVE 2019), PTS 1-4, 2020, 830
  • [47] Shamir's Secret Sharing for Authentication without Reconstructing Password
    Gupta, Kishor Datta
    Rahman, Md Lutfar
    Dasgupta, Dipankar
    Poudyal, Subash
    2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 958 - 963
  • [48] A Modified Multi-secret Sharing Visual Cryptography Scheme
    Yu, Bin
    Fu, Zhengxin
    Fang, Liguo
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 912 - 915
  • [49] A secure and efficient secret sharing scheme with general access structures
    Pang, Liao-Jun
    Li, Hui-Xian
    Wang, Yu-Min
    FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2006, 4223 : 646 - 649
  • [50] Pixel Position Based Efficient Image Secret Sharing Scheme
    Sagar, P. Reshma
    Chakra, J. Pruthvi Sri
    Purushothama, B. R.
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 3, 2018, 709 : 527 - 533