On a fast (k,n)-threshold secret sharing scheme

被引:18
|
作者
Kurihara, Jun [1 ]
Kiyomoto, Shinsaku [1 ]
Fukushima, Kazuhide [1 ]
Tanaka, Toshiaki [1 ]
机构
[1] KDDI R&D Labs Inc, Fujimino 3568502, Japan
关键词
secret sharing scheme; threshold scheme; exclusive-or; entropy random number; ideal secret sharing scheme;
D O I
10.1093/ietfec/e91-a.9.2365
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In Shamir's (k, n)-threshold secret sharing scheme (threshold scheme) [1], a heavy computational cost is required to make n shares and recover the secret from k shares. As a solution to this problem, several fast threshold schemes have been proposed. However, there is no fast ideal (k, n)-threshold scheme, where k and n are arbitrary. This paper proposes a new fast (k, n)-threshold scheme which uses just EXCLUSIVE-OR(XOR) operations to make n shares and recover the secret from k shares. We prove that every combination of k or more participants can recover the secret, but every group of less than k participants cannot obtain any information about the secret in the proposed scheme. Moreover, the proposed scheme is an ideal secret sharing scheme similar to Shamir's scheme, in which every bit-size of shares equals that of the secret. We also evaluate the efficiency of the scheme, and show that our scheme realizes operations that are much faster than Shamir's.
引用
收藏
页码:2365 / 2378
页数:14
相关论文
共 50 条
  • [1] A Fast (k, L, n)-Threshold Ramp Secret Sharing Scheme
    Kurihara, Jun
    Kiyomoto, Shinsaku
    Fukushima, Kazuhide
    Tanaka, Toshiaki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (08) : 1808 - 1821
  • [2] Proactive (k, n) threshold secret sharing scheme with variant k and n
    Wang, Shiuh-Jeng
    Tsai, Yuh-Ren
    Chen, Pin-You
    [J]. 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 117 - 120
  • [3] A new (k, n)-threshold secret sharing scheme and its extension
    Kurihara, Jun
    Kiyomoto, Shinsaku
    Fukushima, Kazuhide
    Tanaka, Toshiaki
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2008, 5222 : 455 - 470
  • [4] A verifiable (k, n)-threshold dynamic quantum secret sharing scheme
    Li, Fulin
    Hu, Hang
    Zhu, Shixin
    Yan, Jiayun
    Ding, Jian
    [J]. QUANTUM INFORMATION PROCESSING, 2022, 21 (07)
  • [5] Cheating identifiable (k, n) threshold quantum secret sharing scheme
    Yan, Chenhong
    Li, Zhihui
    Liu, Lu
    Lu, Dianjun
    [J]. QUANTUM INFORMATION PROCESSING, 2022, 21 (01)
  • [6] A verifiable (k, n)-threshold dynamic quantum secret sharing scheme
    Fulin Li
    Hang Hu
    Shixin Zhu
    Jiayun Yan
    Jian Ding
    [J]. Quantum Information Processing, 21
  • [7] Cheating identifiable (k, n) threshold quantum secret sharing scheme
    Chenhong Yan
    Zhihui Li
    Lu Liu
    Dianjun Lu
    [J]. Quantum Information Processing, 2022, 21
  • [8] A fast (3, n)-threshold secret sharing scheme using Exclusive-OR operations
    Kurihara, Jun
    Kiyomoto, Shinsaku
    Fukushima, Kazuhide
    Tanaka, Toshiaki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (01) : 127 - 138
  • [9] A (n, n)-threshold Secret Sharing Scheme for Barcode Application
    Lin, Pei-Yu
    Chen, Yi-Hui
    Chuang, Jun-Chou
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 1023 - 1028
  • [10] Fair (t, n) threshold secret sharing scheme
    Tian, Youliang
    Ma, Jianfeng
    Peng, Changgen
    Jiang, Qi
    [J]. IET INFORMATION SECURITY, 2013, 7 (02) : 106 - 112