Skip to main content
Top

2013 | OriginalPaper | Chapter

58. Novel and Effective Multi-Secret Sharing Scheme

Authors : Shanyue Bu, Ronggeng Yang

Published in: Proceedings of the International Conference on Information Engineering and Applications (IEA) 2012

Publisher: Springer London

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A new multi-secret sharing (t, n) threshold scheme is proposed in this paper. The scheme uses the Lagrange interpolating polynomial to split and reconstruct the secrets based on Shamir secret sharing scheme, and verifies the legality of data by NTRU algorithm and one-way hashing function. Compared with other public key cryptosystems such as elliptic curve cryptography, the proposed is simpler in design, which requires less calculation and fewer storage spaces. It can detect effectively a variety of cheating and forgery behaviors, which guarantee that the reconstruction of secret is the secure and trustworthy.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Harn L (1995) Efficient sharing (broadcasting) of multiple secrets. IEE Comput Digital Tech 142(3):237–240CrossRef Harn L (1995) Efficient sharing (broadcasting) of multiple secrets. IEE Comput Digital Tech 142(3):237–240CrossRef
3.
go back to reference Heidarvand S, Villar JL (2008) Public verifiability from pairings in secret sharing schemes. SAC LNCS 53(1):294–308 Heidarvand S, Villar JL (2008) Public verifiability from pairings in secret sharing schemes. SAC LNCS 53(1):294–308
4.
go back to reference Tartary C, Pieprzyk J, Wang H (2007) Verifiable multi-secret sharing schemes for multiple threshold access structures. Inscrypt LNCS 49(9):167–181 Tartary C, Pieprzyk J, Wang H (2007) Verifiable multi-secret sharing schemes for multiple threshold access structures. Inscrypt LNCS 49(9):167–181
5.
go back to reference Pang LJ, Pei QQ et al (2008) An identity (ID)-based threshold multi-secret sharing scheme. J Softw 19(10):2739–2745CrossRefMATH Pang LJ, Pei QQ et al (2008) An identity (ID)-based threshold multi-secret sharing scheme. J Softw 19(10):2739–2745CrossRefMATH
6.
go back to reference Bu YS, Kun Y, Wang RC (2009) A secret sharing scheme based on NTRU algorithm. J Chin Comput Syst 30(10):1986–1987 Bu YS, Kun Y, Wang RC (2009) A secret sharing scheme based on NTRU algorithm. J Chin Comput Syst 30(10):1986–1987
7.
go back to reference Zhu JH, Cui GH et al (2008) Trusted verifiable multisecret sharing scheme based on (t, n) threshold. J Chin Comput Syst 29(4):635–638MathSciNet Zhu JH, Cui GH et al (2008) Trusted verifiable multisecret sharing scheme based on (t, n) threshold. J Chin Comput Syst 29(4):635–638MathSciNet
8.
go back to reference Qia S, Du WZ (2011) Multi-secret sharing scheme based on RSA and remainder theorem. Comput Eng 37(2):141–142 Qia S, Du WZ (2011) Multi-secret sharing scheme based on RSA and remainder theorem. Comput Eng 37(2):141–142
Metadata
Title
Novel and Effective Multi-Secret Sharing Scheme
Authors
Shanyue Bu
Ronggeng Yang
Copyright Year
2013
Publisher
Springer London
DOI
https://doi.org/10.1007/978-1-4471-4853-1_58