A new (k, n)-threshold secret sharing scheme and its extension

被引:0
|
作者
Kurihara, Jun [1 ]
Kiyomoto, Shinsaku [1 ]
Fukushima, Kazuhide [1 ]
Tanaka, Toshiaki [1 ]
机构
[1] KDDI R&D Labs Inc, Fujimino, Saitama 3568502, Japan
来源
关键词
secret sharing scheme; threshold scheme; threshold ramp scheme; exclusive-or; entropy; random number; ideal secret sharing scheme;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Shamir's (k, n)-threshold secret sharing scheme (threshold scheme), a heavy computational cost is required to make n shares and recover the secret. As a solution to this problem, several fast threshold schemes have been proposed. This paper proposes a new (k,n)-threshold scheme. For the purpose to realize high performance, the proposed scheme uses just EXCLUSIVE-OR(XOR) operations to make shares and recover the secret. We prove that the proposed scheme is a perfect secret sharing scheme, every combination of k or more participants can recover the secret, but every group of less than k participants cannot obtain any information about the secret. Moreover, we show that the proposed scheme is an ideal secret sharing scheme similar to Shamir's scheme, which is a perfect scheme such that every bit-size of shares equals that of the secret. We also evaluate the efficiency of the scheme, and show that our scheme realizes operations that are much faster than Shamir's. Furthermore, from the aspect of both computational cost and storage usage, we also introduce how to extend the proposed scheme to a new (k, L, n)-threshold ramp scheme similar to the existing ramp scheme based on Shamir's scheme.
引用
收藏
页码:455 / 470
页数:16
相关论文
共 50 条
  • [1] On a fast (k,n)-threshold secret sharing scheme
    Kurihara, Jun
    Kiyomoto, Shinsaku
    Fukushima, Kazuhide
    Tanaka, Toshiaki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (09) : 2365 - 2378
  • [2] Proactive (k, n) threshold secret sharing scheme with variant k and n
    Wang, Shiuh-Jeng
    Tsai, Yuh-Ren
    Chen, Pin-You
    [J]. 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 117 - 120
  • [3] A New (t, n)-Threshold Secret Sharing Scheme
    Tang, Chunming
    Yao, Zheng-an
    [J]. 2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 920 - +
  • [4] Cheating identifiable (k, n) threshold quantum secret sharing scheme
    Yan, Chenhong
    Li, Zhihui
    Liu, Lu
    Lu, Dianjun
    [J]. QUANTUM INFORMATION PROCESSING, 2022, 21 (01)
  • [5] A verifiable (k, n)-threshold dynamic quantum secret sharing scheme
    Li, Fulin
    Hu, Hang
    Zhu, Shixin
    Yan, Jiayun
    Ding, Jian
    [J]. QUANTUM INFORMATION PROCESSING, 2022, 21 (07)
  • [6] A Fast (k, L, n)-Threshold Ramp Secret Sharing Scheme
    Kurihara, Jun
    Kiyomoto, Shinsaku
    Fukushima, Kazuhide
    Tanaka, Toshiaki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (08) : 1808 - 1821
  • [7] A verifiable (k, n)-threshold dynamic quantum secret sharing scheme
    Fulin Li
    Hang Hu
    Shixin Zhu
    Jiayun Yan
    Jian Ding
    [J]. Quantum Information Processing, 21
  • [8] Cheating identifiable (k, n) threshold quantum secret sharing scheme
    Chenhong Yan
    Zhihui Li
    Lu Liu
    Dianjun Lu
    [J]. Quantum Information Processing, 2022, 21
  • [9] A new (t, n)-threshold multi-secret sharing scheme
    Li, HX
    Cheng, CT
    Pang, LJ
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 421 - 426
  • [10] A New (k, n) Secret Image Sharing Scheme (SISS)
    Nag, Amitava
    Biswas, Sushanta
    Sarkar, Debasree
    Sarkar, Partha
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2017, 14 (04) : 448 - 456