Gruppen secret sharing or how to share several secrets if you must?

被引:1
|
作者
Csirmaz, Laszlo [1 ]
机构
[1] Cent European Univ Budapest, Renyi Inst, Budapest, Hungary
关键词
multiple secret sharing; complexity; threshold scheme; secret sharing; interpolation;
D O I
10.2478/s12175-013-0179-1
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Each member of an n-person team has a secret, say a password. The k out of n gruppen secret sharing requires that any group of k members should be able to recover the secrets of the other n - k members, while any group of k - 1 or less members should have no information on the secret of other team member even if other secrets leak out. We prove that when all secrets are chosen independently and have size s, then each team member must have a share of size at least (n - k)s, and we present a scheme which achieves this bound when s is large enough. This result shows a significant saving over n independent applications of Shamir's k out of n - 1 threshold schemes which assigns shares of size (n - 1)s to each team member independently of k. We also show how to set up such a scheme without any trusted dealer, and how the secrets can be recovered, possibly multiple times, without leaking information. We also discuss how our scheme fits to the much-investigated multiple secret sharing methods. (C) 2013 Mathematical Institute Slovak Academy of Sciences
引用
收藏
页码:1391 / 1402
页数:12
相关论文
共 50 条
  • [1] A CITY WILL SHARE HER SECRETS IF YOU KNOW HOW TO ASK
    Ganesh, Chitra
    [J]. MASSACHUSETTS REVIEW, 2022, 63 (01): : 89 - 100
  • [2] Meaningful Share Generation for Increased Number of Secrets in Visual Secret-Sharing Scheme
    Ulutas, Mustafa
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2010, 2010
  • [3] Visual secret sharing for multiple secrets
    Feng, Jen-Bang
    Wu, Hsien-Chu
    Tsai, Chwei-Shyong
    Chang, Ya-Fen
    Chu, Yen-Ping
    [J]. PATTERN RECOGNITION, 2008, 41 (12) : 3572 - 3581
  • [4] HOW TO SHARE A SECRET
    SHAMIR, A
    [J]. COMMUNICATIONS OF THE ACM, 1979, 22 (11) : 612 - 613
  • [5] HOW TO SHARE A SECRET
    MIGNOTTE, M
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1983, 149 : 371 - 375
  • [6] HOW LONG MUST YOU KEEP A SECRET + SOVIET REFUSENIK SCIENTISTS
    SUTTON, J
    [J]. INDEX ON CENSORSHIP, 1988, 17 (09) : 27 - 29
  • [7] Sharing one secret vs. sharing many secrets
    Di Crescenzo, G
    [J]. THEORETICAL COMPUTER SCIENCE, 2003, 295 (1-3) : 123 - 140
  • [8] Multi-secrets Visual Secret Sharing
    Chen, Tzung-Her
    Tsao, Kai-Hsiang
    Wu, Chang-Sian
    [J]. 2008 14TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS, (APCC), VOLS 1 AND 2, 2008, : 491 - 495
  • [9] Ideal secret sharing schemes with multiple secrets
    Jackson, WA
    Martin, KM
    OKeefe, CM
    [J]. JOURNAL OF CRYPTOLOGY, 1996, 9 (04) : 233 - 250
  • [10] Quadratic Secret Sharing and Conditional Disclosure of Secrets
    Beimel, Amos
    Othman, Hussien
    Peter, Naty
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 748 - 778