Skip to main content

2018 | OriginalPaper | Buchkapitel

An Extension of \((2, m(m+1)/2)\)-Threshold Secret Sharing Schemes

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Fast (k, n)-threshold secret sharing schemes with XOR operations have proposed by Kurihara et al. and Fujii et al. independently. Their method are ideal that share size is equal to the size of the data to be distributed with the benefits that can be handled very fast for using the only XOR operations at distribution and reconstruction processes. In these cases for the number of shares n, target data must be equally divided into individual \(n_p-1\) pieces where \(n_p\) is a prime more than n. The existing methods described above are configured using the cyclic matrices with prime order. On the other hand, a new method in WAIS2013 has proposed, this leads to general constructions of \((2,p+1)\)-threshold secret sharing schemes. Moreover, we use m-dimensional vector spaces over \(\mathbb {Z}_2\) on having bases that meet certain conditions in order to construct proposed methods. Moreover, existences of \((2,2^m)\)-threshold secret sharing schemes are published (in NBiS2013) by using a new notion “2-propagation bases set” as a bases set in m-dimensional vector spaces over \(\mathbb {Z}_2\). However this construction for all parameter m is wrong, in other words, it constitutes just only \((2,m(m+1)/2)\)-SSS, not \((2,2^m)\)-SSS. This paper corrects mistakes of construction and also proposes an accurate construction by using Galois field \(GF(2^m)\) that elements are represented in the ring \(F_p[X]/f(X)\) where f(X) is an irreducible polynomial, these functionalities lead to general constructions of \((2,2^m)\)-threshold secret sharing schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
12.
Zurück zum Zitat Blakley, G.R.: Safeguarding cryptographic keys. Proc. AFIPS 48, 313–317 (1979) Blakley, G.R.: Safeguarding cryptographic keys. Proc. AFIPS 48, 313–317 (1979)
13.
Zurück zum Zitat Fujii, Y., Tada, M., Hosaka, N., Tochikubo, K., Kato, T.: A fast (2, n)-threshold scheme and its application. In: Proceedings of CSS2005, pp. 631–636 (2005). (in Japanese) Fujii, Y., Tada, M., Hosaka, N., Tochikubo, K., Kato, T.: A fast (2, n)-threshold scheme and its application. In: Proceedings of CSS2005, pp. 631–636 (2005). (in Japanese)
14.
Zurück zum Zitat Tada, M., Fujii, Y., Hosaka, N., Tochikubo, K., Kato, T.: A secret sharing scheme with threshold 3. In: Proceedings of CSS2005, pp. 637–642 (2005). (in Japanese) Tada, M., Fujii, Y., Hosaka, N., Tochikubo, K., Kato, T.: A secret sharing scheme with threshold 3. In: Proceedings of CSS2005, pp. 637–642 (2005). (in Japanese)
15.
Zurück zum Zitat Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: On a fast (k, n)-threshold secret sharing scheme. IEICE Trans. Fund. E91–A(9), 2365–2378 (2008)CrossRefMATH Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: On a fast (k, n)-threshold secret sharing scheme. IEICE Trans. Fund. E91–A(9), 2365–2378 (2008)CrossRefMATH
16.
Zurück zum Zitat Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A new (k, n)-threshold secret sharing scheme and its extension. In: 11th Information Security Conference (ISC2008). LNCS, vol. 5222, pp. 455–470 (2008) Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A new (k, n)-threshold secret sharing scheme and its extension. In: 11th Information Security Conference (ISC2008). LNCS, vol. 5222, pp. 455–470 (2008)
17.
Zurück zum Zitat Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A fast (k, L, n)-threshold ramp secret sharing scheme. IEICE Trans. Fund. E92–A(8), 1808–1821 (2009)CrossRef Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A fast (k, L, n)-threshold ramp secret sharing scheme. IEICE Trans. Fund. E92–A(8), 1808–1821 (2009)CrossRef
18.
Zurück zum Zitat Suga, Y.: New constructions of (2, n)-threshold secret sharing schemes using exclusive-or operations. In: The 7th International Workshop on Advances in Information Security (WAIS2013), pp. 837–842 (2013) Suga, Y.: New constructions of (2, n)-threshold secret sharing schemes using exclusive-or operations. In: The 7th International Workshop on Advances in Information Security (WAIS2013), pp. 837–842 (2013)
19.
Zurück zum Zitat Suga, Y.: A fast (2 2\(\hat{m}\))- threshold secret sharing scheme using M linearly independent binary vectors. In: The 6th International Conference on Network-Based information Systems (NBiS 2013), pp. 539–544 (2013) Suga, Y.: A fast (2 2\(\hat{m}\))- threshold secret sharing scheme using M linearly independent binary vectors. In: The 6th International Conference on Network-Based information Systems (NBiS 2013), pp. 539–544 (2013)
Metadaten
Titel
An Extension of -Threshold Secret Sharing Schemes
verfasst von
Yuji Suga
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-65521-5_84