Skip to main content
Top
Published in: Designs, Codes and Cryptography 1/2018

08-02-2017

Combinatorial repairability for threshold schemes

Authors: Douglas R. Stinson, Ruizhong Wei

Published in: Designs, Codes and Cryptography | Issue 1/2018

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, we consider methods whereby a subset of players in a (kn)-threshold scheme can “repair” another player’s share in the event that their share has been lost or corrupted. This will take place without the participation of the dealer who set up the scheme. The repairing protocol should not compromise the (unconditional) security of the threshold scheme, and it should be efficient, where efficiency is measured in terms of the amount of information exchanged during the repairing process. We study two approaches to repairing. The first method is based on the “enrollment protocol” from Nojoumian et al. (IET Inf Secur 4: 202–211, 2010) which was originally developed to add a new player to a threshold scheme (without the participation of the dealer) after the scheme was set up. The second method distributes “multiple shares” to each player, as defined by a suitable combinatorial design. This method results in larger shares, but lower communication complexity, as compared to the first method.
Footnotes
1
This technique has most commonly been considered in the past in connection with the construction of secret sharing schemes for non-threshold access structures; see, e.g., [3, Theorem 1].
 
2
Note that, if \(\ell _2 - \ell _1 = 1\), then the ramp scheme is a threshold scheme, and we have the construction described in the previous section.
 
Literature
1.
go back to reference Abel R.J.R., Ge G., Yin J.: Resolvable and near-resolvable designs. In: Colbourn C.J., Dinitz J.H. (eds.) CRC Handbook of Combinatorial Designs, pp. 124–134. Chapman & Hall/CRC, Boca Raton (2007). Abel R.J.R., Ge G., Yin J.: Resolvable and near-resolvable designs. In: Colbourn C.J., Dinitz J.H. (eds.) CRC Handbook of Combinatorial Designs, pp. 124–134. Chapman & Hall/CRC, Boca Raton (2007).
3.
go back to reference Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. In: CRYPTO ’88 Proceedings. Lecture Notes in Computer Science, vol. 403, pp. 27–35 (1990). Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. In: CRYPTO ’88 Proceedings. Lecture Notes in Computer Science, vol. 403, pp. 27–35 (1990).
4.
go back to reference Chee Y.M., Colbourn C.J., Ling A.C.H.: Asymptotically optimal erasure-resilient codes for large disk arrays. Discret. Appl. Math. 102, 3–36 (2000).MathSciNetCrossRefMATH Chee Y.M., Colbourn C.J., Ling A.C.H.: Asymptotically optimal erasure-resilient codes for large disk arrays. Discret. Appl. Math. 102, 3–36 (2000).MathSciNetCrossRefMATH
5.
go back to reference Colbourn C., Rosa A.: Triple Systems. Oxford Mathematical Monographs. Oxford University Press, Oxford (1999). Colbourn C., Rosa A.: Triple Systems. Oxford Mathematical Monographs. Oxford University Press, Oxford (1999).
6.
go back to reference Dimakis A.G., Godfrey P.B., Wu Y., Wainwright M.J., Ramchandran K.: Network coding for distributed storage systems. IEEE Trans. Inf. Theory. 56, 4539–4551 (2010).CrossRef Dimakis A.G., Godfrey P.B., Wu Y., Wainwright M.J., Ramchandran K.: Network coding for distributed storage systems. IEEE Trans. Inf. Theory. 56, 4539–4551 (2010).CrossRef
7.
9.
go back to reference Nojoumian, M., Stinson, D.R., Grainger, M.: Unconditionally secure social secret sharing scheme. IET Inf. Secur. 4, 202–211 (2010) (Special issue on multi-agent and distributed information security). Nojoumian, M., Stinson, D.R., Grainger, M.: Unconditionally secure social secret sharing scheme. IET Inf. Secur. 4, 202–211 (2010) (Special issue on multi-agent and distributed information security).
10.
go back to reference Nojoumian, M.: Novel secret sharing and commitment schemes for cryptographic applications. PhD thesis, University of Waterloo (2012) Nojoumian, M.: Novel secret sharing and commitment schemes for cryptographic applications. PhD thesis, University of Waterloo (2012)
11.
go back to reference Ogata W., Kurosawa K.: Some basic properties of general nonperfect secret sharing schemes. J. Univ. Comput. Sci. 4, 690–704 (1998).MathSciNetMATH Ogata W., Kurosawa K.: Some basic properties of general nonperfect secret sharing schemes. J. Univ. Comput. Sci. 4, 690–704 (1998).MathSciNetMATH
13.
go back to reference Stinson D.R.: Combinatorial Designs: Constructions and Analysis. Springer, New York (2004).MATH Stinson D.R.: Combinatorial Designs: Constructions and Analysis. Springer, New York (2004).MATH
14.
go back to reference Stinson D.R.: Cryptography Theory and Practice, 3rd edn. Chapman & Hall/CRC, Boca Raton (2006).MATH Stinson D.R.: Cryptography Theory and Practice, 3rd edn. Chapman & Hall/CRC, Boca Raton (2006).MATH
Metadata
Title
Combinatorial repairability for threshold schemes
Authors
Douglas R. Stinson
Ruizhong Wei
Publication date
08-02-2017
Publisher
Springer US
Published in
Designs, Codes and Cryptography / Issue 1/2018
Print ISSN: 0925-1022
Electronic ISSN: 1573-7586
DOI
https://doi.org/10.1007/s10623-017-0336-6

Other articles of this Issue 1/2018

Designs, Codes and Cryptography 1/2018 Go to the issue

Premium Partner