(t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial

被引:3
|
作者
Lein Harn
Ching-Fang Hsu
机构
[1] University of Missouri-Kansas City,Department of Computer Science Electrical Engineering
[2] Central China Normal University,Computer School
来源
Wireless Personal Communications | 2017年 / 95卷
关键词
Secret sharing scheme; Multiple secrets; Unconditional security; Bivariate polynomial;
D O I
暂无
中图分类号
学科分类号
摘要
In a (t, n) secret sharing scheme (SS), a dealer divides the secret into n shares in such way that any t or more than t shares can reconstruct the secret but fewer than t shares cannot reconstruct the secret. The multi-SS is an extension of the (t, n) SS in which shares can be reused to reconstruct multiple secrets. Thus, the efficiency of the multi-SS is better than the efficiency of the (t, n) SS. In this paper, we propose the first multi-SS using a bivariate polynomial. Our design is unique in comparing with all existing multi-SSs. Shares generated using a bivariate polynomial can not only be used to reconstruct multiple secrets but also be used to establish pairwise keys between any pair of shareholders. The pairwise keys can protect exchange information in the secret reconstruction to prevent outsiders from obtaining the recovered secrets. All existing multi-SSs require additional key establishment to accomplish this.
引用
收藏
页码:1495 / 1504
页数:9
相关论文
共 50 条
  • [1] (t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial
    Harn, Lein
    Hsu, Ching-Fang
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (02) : 1495 - 1504
  • [2] A new fair multi-secret sharing scheme based on asymmetric bivariate polynomial
    Li, Fulin
    Liu, Yang
    Yan, Jiayun
    Zhu, Shixin
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2022, 14 (05): : 1039 - 1053
  • [3] A new fair multi-secret sharing scheme based on asymmetric bivariate polynomial
    Fulin Li
    Yang Liu
    Jiayun Yan
    Shixin Zhu
    Cryptography and Communications, 2022, 14 : 1039 - 1053
  • [4] A (t, n) multi-secret sharing scheme
    Yang, CC
    Chang, TY
    Hwang, MS
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 151 (02) : 483 - 490
  • [5] A New (t, n) Multi-secret Sharing Scheme
    Tan, Xiao-qing
    Wang, Zhi-guo
    ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 861 - +
  • [6] A practical (t, n) multi-secret sharing scheme
    Chien, HY
    Jan, JK
    Tseng, YM
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (12) : 2762 - 2765
  • [7] A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing
    Pang, LJ
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 840 - 848
  • [8] A Secure and Efficient (t, n) Multi-Secret Sharing Scheme
    PANG Liao-jun
    Wuhan University Journal of Natural Sciences, 2005, (01) : 191 - 194
  • [9] An efficient (t, n) multi-secret sharing scheme with verification
    Pang, L. J.
    Li, H. X.
    Jiao, L. C.
    Wang, Y. M.
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 552 - 557
  • [10] A new (t, n)-threshold multi-secret sharing scheme
    Li, HX
    Cheng, CT
    Pang, LJ
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 421 - 426