A perfect secret sharing scheme for general access structures

被引:11
|
作者
Jia, Xingxing [1 ,2 ]
Guo, Yusheng [1 ]
Luo, Xiangyang [3 ]
Wang, Daoshun [4 ]
Zhang, Chaoyang [5 ]
机构
[1] Lanzhou Univ, Sch Math & Stat, Lanzhou, Gansu, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin, Peoples R China
[3] State Key Lab Math Engn & Adv Comp, Zhengzhou, Peoples R China
[4] Tsinghua Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
[5] Univ Southern Mississippi, Sch Comp, Hattiesburg, MS 39406 USA
基金
中国国家自然科学基金;
关键词
Secret sharing; Chinese Remainder Theorem; General access structure; Polynomial ring; Integral linear programming;
D O I
10.1016/j.ins.2022.02.016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The secret sharing (SS) scheme has been widely used as the de facto paradigm for group key management in cryptography and distributed computation. An SS scheme for a general access structure (GSS) has drawn more and more attention since it allows flexible access control. However, previous solutions to GSS need to either assign multiple shares to each participant or to solve a complex nonlinear integer programming. In this paper, we propose a novel strategy to address the two problems simultaneously based on the Chinese Remainder Theorem (CRT) for a polynomial ring over a finite field. We classify general access structures satisfying the monotone property into the two families of maximum forbidden subsets and minimum qualified subsets conforming to the security condition and the revealing condition. The moduli used in the scheme are pairwise coprime polynomials and can take the irreducible polynomials. To find the degrees of these polynomials, we only need to solve an integer linear programming (ILP) by minimizing the sum of the degrees of all the moduli. The proposed scheme is inherently a weighted SS scheme and may have no solution which commonly exists in all GSS schemes. To ensure a solution, we put forth a preprocessing algorithm which separates the original access structure into several subaccess structures based on graph theory. The proposed scheme only assigns a share for each participant and achieves perfect security. It has good generalization and provides a universal approach to program the scheme construction for SS schemes with general access structures, threshold access structures and weighted access structures. (C) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页码:54 / 69
页数:16
相关论文
共 50 条
  • [1] A secure and efficient secret sharing scheme with general access structures
    Pang, Liao-Jun
    Li, Hui-Xian
    Wang, Yu-Min
    [J]. FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2006, 4223 : 646 - 649
  • [2] A secret sharing scheme with general access structures and its applications
    Sang, Yongxuan
    Zeng, Jiwen
    Li, Zhongwen
    You, Lin
    [J]. International Journal of Advancements in Computing Technology, 2011, 3 (04) : 121 - 128
  • [3] Multi-secret sharing scheme with general access structures
    Li, Hui-Xian
    Cheng, Chun-Tian
    Pang, Liao-Jun
    [J]. Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2006, 34 (06): : 95 - 98
  • [4] Non-perfect secret sharing over general access structures
    Srinathan, K
    Rajan, NT
    Rangan, CP
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 409 - 421
  • [5] Constructing perfect secret sharing schemes for general and uniform access structures
    Sun, HM
    Shieh, SP
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 1999, 15 (05) : 679 - 689
  • [6] An Efficient Multi-secret Sharing Scheme with General Access Structures
    Wei Yun
    Zhang Xingkai
    Xiong Guohua
    [J]. ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 1246 - 1250
  • [7] A Multi-stage Secret Sharing Scheme with General Access Structures
    Wei Yun
    Zhong Pucha
    Xiong Guohua
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12613 - +
  • [8] A Label Graph Based Verifiable Secret Sharing Scheme for General Access Structures
    Hsu, Ching-Fang
    Zeng, Bing
    Cheng, Qi
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (04) : 407 - 410
  • [9] An Efficient and Secure Multi-Secret Sharing Scheme with General Access Structures
    PANG Liaojun~ 1
    2. School of Computer Science
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1649 - 1652
  • [10] Secret Sharing Schemes with General Access Structures
    Liu, Jian
    Mesnager, Sihem
    Chen, Lusheng
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 341 - 360