REUSING SHARES IN SECRET SHARING SCHEMES

被引:14
|
作者
ZHENG, YL
HARDJONO, T
SEBERRY, J
机构
来源
COMPUTER JOURNAL | 1994年 / 37卷 / 03期
关键词
D O I
10.1093/comjnl/37.3.199
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A (t, w) threshold scheme is a method for sharing a secret among w shareholders so that the collaboration of at least t shareholders is required in order to reconstruct the shared secret. This paper is concerned with the re-use of shares possessed by shareholders in threshold schemes. We propose a simple (t, w) threshold scheme based on the use of cryptographically strong pseudo-random functions and universal hash functions. A remarkable advantage of the scheme is that a shareholder can use a single string in the share of many different secrets; in particular, a shareholder need not be given a new share each time a new secret is to be shared.
引用
收藏
页码:199 / 205
页数:7
相关论文
共 50 条
  • [21] Partial Secret Sharing Schemes
    Jafari, Amir
    Khazaei, Shahram
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (08) : 5364 - 5385
  • [22] Efficient Secret Sharing Schemes
    Lv, Chunli
    Jia, Xiaoqi
    Lin, Jingqiang
    Jing, Jiwu
    Tian, Lijun
    Sun, Mingli
    SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 114 - +
  • [23] Anonymous secret sharing schemes
    Blundo, C
    Stinson, DR
    DISCRETE APPLIED MATHEMATICS, 1997, 77 (01) : 13 - 28
  • [24] Explication of secret sharing schemes
    Stinson, D.R.
    Designs, Codes, and Cryptography, 1992, 2 (04)
  • [25] Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes
    Eriguchi, Reo
    Kunihiro, Noboru
    2019 IEEE INFORMATION THEORY WORKSHOP (ITW), 2019, : 264 - 268
  • [26] Visual secret sharing schemes for plural secret images
    Iwamoto, M
    Yamamoto, H
    2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 283 - 283
  • [27] Verifiable Secret Redistribution for Proactive Secret Sharing Schemes
    于佳
    孔凡玉
    李大兴
    JournalofShanghaiJiaotongUniversity(Science), 2006, (02) : 236 - 241
  • [28] A NOVEL IMAGE SECRET SHARING SCHEME WITH MEANINGFUL SHARES
    Cai, Hongliang
    Liu, Huajian
    Yuan, Qizhao
    Steinebach, Martin
    Wang, Xiaojing
    2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP), 2015, : 1767 - 1771
  • [29] Sharing a Secret Image with Encapsulated Shares in Visual Cryptography
    Shankar, K.
    Eswaran, P.
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2015, 70 : 462 - 468
  • [30] A (k, n) secret document sharing with meaningful shares
    Yang, Ching-Nung
    Tsai, Po-Yu
    Liu, Yanxiao
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 62