2018 | OriginalPaper | Buchkapitel
Tipp
Weitere Kapitel dieses Buchs durch Wischen aufrufen
Erschienen in:
Advances in Network-Based Information Systems
Fast (k, n)-threshold secret sharing schemes with XOR operations have proposed by Kurihara et al. and Fujii et al. independently. Their method are ideal that share size is equal to the size of the data to be distributed with the benefits that can be handled very fast for using the only XOR operations at distribution and reconstruction processes. In these cases for the number of shares n, target data must be equally divided into individual \(n_p-1\) pieces where \(n_p\) is a prime more than n. The existing methods described above are configured using the cyclic matrices with prime order. On the other hand, a new method in WAIS2013 has proposed, this leads to general constructions of \((2,p+1)\)-threshold secret sharing schemes. Moreover, we use m-dimensional vector spaces over \(\mathbb {Z}_2\) on having bases that meet certain conditions in order to construct proposed methods. Moreover, existences of \((2,2^m)\)-threshold secret sharing schemes are published (in NBiS2013) by using a new notion “2-propagation bases set” as a bases set in m-dimensional vector spaces over \(\mathbb {Z}_2\). However this construction for all parameter m is wrong, in other words, it constitutes just only \((2,m(m+1)/2)\)-SSS, not \((2,2^m)\)-SSS. This paper corrects mistakes of construction and also proposes an accurate construction by using Galois field \(GF(2^m)\) that elements are represented in the ring \(F_p[X]/f(X)\) where f(X) is an irreducible polynomial, these functionalities lead to general constructions of \((2,2^m)\)-threshold secret sharing schemes.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Anzeige
1.
2.
3.
4.
Zurück zum Zitat DMTF’s Open Cloud Standards Incubator. http://www.dmtf.org/standards/cloud DMTF’s Open Cloud Standards Incubator.
http://www.dmtf.org/standards/cloud
5.
6.
7.
Zurück zum Zitat American Institute of Certified Public Accountants (AICPA), Statement on Auditing Standards (SAS) No. 70 type II. http://www.sas70.com/ American Institute of Certified Public Accountants (AICPA), Statement on Auditing Standards (SAS) No. 70 type II.
http://www.sas70.com/
8.
Zurück zum Zitat Cloud Security Alliance: Security, Trust & Assurance Registry (STAR). https://cloudsecurityalliance.org/star/ Cloud Security Alliance: Security, Trust & Assurance Registry (STAR).
https://cloudsecurityalliance.org/star/
9.
Zurück zum Zitat Cloud Computing Use Case Discussion Group. Cloud Computing Use Case White Paper version 4. http://cloudusecases.org/ Cloud Computing Use Case Discussion Group. Cloud Computing Use Case White Paper version 4.
http://cloudusecases.org/
10.
Zurück zum Zitat IIJ, IIR vol.4, Section 1.4.3: Cloud Computing and Security. http://www.iij.ad.jp/en/development/iir/pdf/iir_vol04_infra_EN.pdf IIJ, IIR vol.4, Section 1.4.3: Cloud Computing and Security.
http://www.iij.ad.jp/en/development/iir/pdf/iir_vol04_infra_EN.pdf
11.
Zurück zum Zitat Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979) MathSciNetCrossRefMATH Shamir, A.: How to share a secret. Commun. ACM
22(11), 612–613 (1979)
MathSciNetCrossRefMATH
12.
Zurück zum Zitat Blakley, G.R.: Safeguarding cryptographic keys. Proc. AFIPS 48, 313–317 (1979) Blakley, G.R.: Safeguarding cryptographic keys. Proc. AFIPS
48, 313–317 (1979)
13.
Zurück zum Zitat Fujii, Y., Tada, M., Hosaka, N., Tochikubo, K., Kato, T.: A fast (2, n)-threshold scheme and its application. In: Proceedings of CSS2005, pp. 631–636 (2005). (in Japanese) Fujii, Y., Tada, M., Hosaka, N., Tochikubo, K., Kato, T.: A fast (2, n)-threshold scheme and its application. In: Proceedings of CSS2005, pp. 631–636 (2005). (in Japanese)
14.
Zurück zum Zitat Tada, M., Fujii, Y., Hosaka, N., Tochikubo, K., Kato, T.: A secret sharing scheme with threshold 3. In: Proceedings of CSS2005, pp. 637–642 (2005). (in Japanese) Tada, M., Fujii, Y., Hosaka, N., Tochikubo, K., Kato, T.: A secret sharing scheme with threshold 3. In: Proceedings of CSS2005, pp. 637–642 (2005). (in Japanese)
15.
Zurück zum Zitat Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: On a fast (k, n)-threshold secret sharing scheme. IEICE Trans. Fund. E91–A(9), 2365–2378 (2008) CrossRefMATH Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: On a fast (k, n)-threshold secret sharing scheme. IEICE Trans. Fund.
E91–A(9), 2365–2378 (2008)
CrossRefMATH
16.
Zurück zum Zitat Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A new (k, n)-threshold secret sharing scheme and its extension. In: 11th Information Security Conference (ISC2008). LNCS, vol. 5222, pp. 455–470 (2008) Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A new (k, n)-threshold secret sharing scheme and its extension. In: 11th Information Security Conference (ISC2008). LNCS, vol. 5222, pp. 455–470 (2008)
17.
Zurück zum Zitat Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A fast (k, L, n)-threshold ramp secret sharing scheme. IEICE Trans. Fund. E92–A(8), 1808–1821 (2009) CrossRef Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A fast (k, L, n)-threshold ramp secret sharing scheme. IEICE Trans. Fund.
E92–A(8), 1808–1821 (2009)
CrossRef
18.
Zurück zum Zitat Suga, Y.: New constructions of (2, n)-threshold secret sharing schemes using exclusive-or operations. In: The 7th International Workshop on Advances in Information Security (WAIS2013), pp. 837–842 (2013) Suga, Y.: New constructions of (2, n)-threshold secret sharing schemes using exclusive-or operations. In: The 7th International Workshop on Advances in Information Security (WAIS2013), pp. 837–842 (2013)
19.
Zurück zum Zitat Suga, Y.: A fast (2 2 \(\hat{m}\))- threshold secret sharing scheme using M linearly independent binary vectors. In: The 6th International Conference on Network-Based information Systems (NBiS 2013), pp. 539–544 (2013) Suga, Y.: A fast (2 2
\(\hat{m}\))- threshold secret sharing scheme using M linearly independent binary vectors. In: The 6th International Conference on Network-Based information Systems (NBiS 2013), pp. 539–544 (2013)
- Titel
- An Extension of -Threshold Secret Sharing Schemes
- DOI
- https://doi.org/10.1007/978-3-319-65521-5_84
- Autor:
-
Yuji Suga
- Sequenznummer
- 84