Skip to main content
Top

2019 | OriginalPaper | Chapter

An Ideal and Perfect (t, n) Multi-secret Sharing Scheme Based on Finite Geometry

Authors : Barun Duari, Debasis Giri

Published in: Information Technology and Applied Mathematics

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Secret sharing has numerous applications in cryptography field and distributed computing. Threshold secret allotment scheme has been well considered a lot for the last three decades and proposed many such efficient schemes. The main objective of allotment sharing scheme is to deliver the secret to some parties so that only desirable subsets of the parties can get back the secrets whereas secret cannot be leaked by other parties. Nowadays, an ideal scheme shares multiple secrets with perfect security is of high demand. In this paper, we have designed a multi-secret sharing scheme on the basis of geometry in Galois field. The scheme is ideal, perfect without information leakage.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Blakley, G.R.: Safeguarding cryptographic keys. Proc. AFIPS 48, 313–317 (1979) Blakley, G.R.: Safeguarding cryptographic keys. Proc. AFIPS 48, 313–317 (1979)
3.
go back to reference Blakley, G.R., Meadows, C.: Security of ramp schemes. In: Proceedings of CRYPTO ’84, LNCS 196, Springer, pp. 242–269 (1985) Blakley, G.R., Meadows, C.: Security of ramp schemes. In: Proceedings of CRYPTO ’84, LNCS 196, Springer, pp. 242–269 (1985)
4.
go back to reference Mignotte, M.: How to share a secret. In: Proceedings of the Conference on Cryptography, pp. 371–375 (1982) Mignotte, M.: How to share a secret. In: Proceedings of the Conference on Cryptography, pp. 371–375 (1982)
5.
go back to reference Harn, L.: Efficient sharing (broadcasting) of multiple secrets. IEE Proc. Comput. Digital Techniq. 142(3), 237–240 (1995)CrossRef Harn, L.: Efficient sharing (broadcasting) of multiple secrets. IEE Proc. Comput. Digital Techniq. 142(3), 237–240 (1995)CrossRef
6.
go back to reference Hwang, R.J., Chang, C.C.: An on-line secret sharing scheme for multi secrets. J. Comput. Commun. 21(13), 1170–1176 (1998)CrossRef Hwang, R.J., Chang, C.C.: An on-line secret sharing scheme for multi secrets. J. Comput. Commun. 21(13), 1170–1176 (1998)CrossRef
7.
go back to reference Chien, H.Y., Jan, J.K., Tseng, Y.M.: A practical (t, n) multi-secret sharing scheme. In: IEICE Transformation of Fundamentals of Electronics, Communications and Computer, pp. 2762–2765 (2000) Chien, H.Y., Jan, J.K., Tseng, Y.M.: A practical (t, n) multi-secret sharing scheme. In: IEICE Transformation of Fundamentals of Electronics, Communications and Computer, pp. 2762–2765 (2000)
8.
go back to reference Yang, C.C., Chang, T.Y., Hwang, M.S.: A (t, n) multi-secret sharing scheme. J. Appl. Math. Comput. 151(2), 483–490 (2004)MathSciNetCrossRef Yang, C.C., Chang, T.Y., Hwang, M.S.: A (t, n) multi-secret sharing scheme. J. Appl. Math. Comput. 151(2), 483–490 (2004)MathSciNetCrossRef
9.
go back to reference Hwang, R.J., Lee, W.B., Chang, C.C.: A concept of designing cheater identification methods for secret sharing. J. Syst. Softw. 46(1), 7–11 (1999)CrossRef Hwang, R.J., Lee, W.B., Chang, C.C.: A concept of designing cheater identification methods for secret sharing. J. Syst. Softw. 46(1), 7–11 (1999)CrossRef
10.
go back to reference Pang, L.J., Wang, Y.M.: A new (t, n) multi-secret sharing scheme based on Shamir’s secret sharing. J. Appl. Math. Comput. 167(2), 840–848 (2005)MathSciNetCrossRef Pang, L.J., Wang, Y.M.: A new (t, n) multi-secret sharing scheme based on Shamir’s secret sharing. J. Appl. Math. Comput. 167(2), 840–848 (2005)MathSciNetCrossRef
11.
go back to reference Bai, L.: A Strong Ramp Secret Sharing Scheme Using Matrix Projection, Presented at the Second International Workshop on Trust. Security and Privacy for Ubiquitous Computing, Niagara-Falls, Buffalo, NY (2006) Bai, L.: A Strong Ramp Secret Sharing Scheme Using Matrix Projection, Presented at the Second International Workshop on Trust. Security and Privacy for Ubiquitous Computing, Niagara-Falls, Buffalo, NY (2006)
12.
go back to reference Tang, C., Yao, Z.: A New (t, n)-threshold secret sharing scheme. In: International Conference on Advanced Computer Theory and Engineering, IEEE pp. 920–924 (2008) Tang, C., Yao, Z.: A New (t, n)-threshold secret sharing scheme. In: International Conference on Advanced Computer Theory and Engineering, IEEE pp. 920–924 (2008)
13.
go back to reference Shi, R., Zhong, H.: A secret sharing scheme with the changeable threshold value. In: International Symposium on Information Engineering and Electronic Commerce, IEEE 2009 pp. 233–236 Shi, R., Zhong, H.: A secret sharing scheme with the changeable threshold value. In: International Symposium on Information Engineering and Electronic Commerce, IEEE 2009 pp. 233–236
14.
go back to reference Chou,Y., Chih, H.L., Pao, C.L., Li, Y.C.: A (2, 3) threshold secret sharing scheme using Sudoku. In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE (2010) Chou,Y., Chih, H.L., Pao, C.L., Li, Y.C.: A (2, 3) threshold secret sharing scheme using Sudoku. In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE (2010)
15.
16.
go back to reference Liu, Y.X., Harn, L., Yang, C.N., Zhang, Y.Q.: Efficient (n, t, n) secret sharing schemes. J. Syst. Softw. 85(6), 1325–1332 (2012)CrossRef Liu, Y.X., Harn, L., Yang, C.N., Zhang, Y.Q.: Efficient (n, t, n) secret sharing schemes. J. Syst. Softw. 85(6), 1325–1332 (2012)CrossRef
17.
go back to reference Patil, S., Desmukh, P.: A novel (t, n) threshold secret sharing using dot product of linearly independent vectors. Int. J. Adv. Res. Comput. Commun. Eng. 2(7) (2013) Patil, S., Desmukh, P.: A novel (t, n) threshold secret sharing using dot product of linearly independent vectors. Int. J. Adv. Res. Comput. Commun. Eng. 2(7) (2013)
18.
go back to reference Guo, C., Chang, C.C.: A construction for secret sharing scheme with general access structure. J. Informat. Hiding Multimed. Signal Proc. 4(1) (2013) Guo, C., Chang, C.C.: A construction for secret sharing scheme with general access structure. J. Informat. Hiding Multimed. Signal Proc. 4(1) (2013)
20.
go back to reference Zhao, D., Peng, H., Wang, C., Yang, Y.: A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure. J. Comput. Math. Appl. 64, 611–615 (2012)MathSciNetCrossRef Zhao, D., Peng, H., Wang, C., Yang, Y.: A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure. J. Comput. Math. Appl. 64, 611–615 (2012)MathSciNetCrossRef
21.
go back to reference Su, J., Juan, T., Chuang Y.L., Li, M.J.: An online verifiable and detectable (t, n) multi-secret sharing scheme based on HS-TS. In: Proceedings of Fourth International Conference in Information Technology and Applications (ICITA2007), Harbin, China, EI , vol. I, pp. 56–59 January 15–18, 2007 Su, J., Juan, T., Chuang Y.L., Li, M.J.: An online verifiable and detectable (t, n) multi-secret sharing scheme based on HS-TS. In: Proceedings of Fourth International Conference in Information Technology and Applications (ICITA2007), Harbin, China, EI , vol. I, pp. 56–59 January 15–18, 2007
22.
go back to reference Hsu, C., Cheng, Q., Tang, X., Zeng, B.: An ideal multi-secret sharing scheme based on MSP. J. Inf. Sci. 181(7), 1403–1409 (2011)MathSciNetCrossRef Hsu, C., Cheng, Q., Tang, X., Zeng, B.: An ideal multi-secret sharing scheme based on MSP. J. Inf. Sci. 181(7), 1403–1409 (2011)MathSciNetCrossRef
23.
go back to reference Subba Rao, Y.V., Chakravarthy, B.: CRT based threshold multi secret sharing scheme. Int. J. Netw. Security, 16(4), 249–255 (2014) Subba Rao, Y.V., Chakravarthy, B.: CRT based threshold multi secret sharing scheme. Int. J. Netw. Security, 16(4), 249–255 (2014)
Metadata
Title
An Ideal and Perfect (t, n) Multi-secret Sharing Scheme Based on Finite Geometry
Authors
Barun Duari
Debasis Giri
Copyright Year
2019
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7590-2_6

Premium Partner