REUSING SHARES IN SECRET SHARING SCHEMES

被引:14
|
作者
ZHENG, YL
HARDJONO, T
SEBERRY, J
机构
来源
COMPUTER JOURNAL | 1994年 / 37卷 / 03期
关键词
D O I
10.1093/comjnl/37.3.199
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A (t, w) threshold scheme is a method for sharing a secret among w shareholders so that the collaboration of at least t shareholders is required in order to reconstruct the shared secret. This paper is concerned with the re-use of shares possessed by shareholders in threshold schemes. We propose a simple (t, w) threshold scheme based on the use of cryptographically strong pseudo-random functions and universal hash functions. A remarkable advantage of the scheme is that a shareholder can use a single string in the share of many different secrets; in particular, a shareholder need not be given a new share each time a new secret is to be shared.
引用
收藏
页码:199 / 205
页数:7
相关论文
共 50 条
  • [1] Reusing shares in secret sharing schemes
    Zheng, Yuliang, 1600, (37):
  • [2] Probability of shares in secret sharing schemes
    Blundo, C
    De Santis, A
    Gaggia, AG
    INFORMATION PROCESSING LETTERS, 1999, 72 (5-6) : 169 - 175
  • [3] Probability of shares in secret sharing schemes
    Dipto. di Info. Ed Applicazioni, Univ. di Salerno, 84081 , Baronissi, Italy
    Inf Process Lett, 5-6 (169-175):
  • [4] ON THE SIZE OF SHARES FOR SECRET SHARING SCHEMES
    CAPOCELLI, RM
    DESANTIS, A
    GARGANO, L
    VACCARO, U
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 576 : 101 - 113
  • [5] Visual secret sharing schemes for multiple secret images allowing the rotation of shares
    Iwamoto, Mitsugu
    Wang, Lei
    Yoneyama, Kazuki
    Kunihiro, Noboru
    Ohta, Kazuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (05) : 1382 - 1395
  • [6] Lower bound on the sire of shares of nonperfect secret sharing schemes
    Okada, K
    Kurosawa, K
    ADVANCES IN CRYPTOLOGY - ASIACRYPT '94, 1995, 917 : 33 - 41
  • [7] Improvement of the Quality of Visual Secret Sharing Schemes with Constraints on the Usage of Shares
    Fujii, Mariko
    Shibuya, Tomoharu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (01): : 11 - 24
  • [8] Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes
    Sirhindi, Rabia
    Murtaza, Saeed
    Afzal, Mehreen
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2008, 5308 : 376 - 386
  • [9] On secret sharing schemes
    Blundo, C
    De Santis, A
    Vaccaro, U
    INFORMATION PROCESSING LETTERS, 1998, 65 (01) : 25 - 32
  • [10] Visual Secret Sharing with Meaningful Shares
    Shyu, Shyong Jian
    2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 576 - 580