Distributed Multi-User Secret Sharing
نویسندگان
چکیده
We consider a distributed secret sharing system that consists of dealer, n storage nodes, and m users. Each user is given access to certain subset where it can download the stored data. The dealer wants securely convey specific s j j via for j=1,2, ..., m. More specifically, two secrecy conditions are considered in this multi-user context. weak condition each does not get any information about individual secrets other users, while perfect implies collection all users' secrets. In system, encodes into several shares loads them nodes. Given number nodes we find maximum users be served such construct schemes achieve with secrecy. further define major properties systems; communication complexity defined as total amount data need order reconstruct their secrets; overhead size loaded by normalized Lower bounds on minimum characterized protocols, under parameters, attain lower bound providing Furthermore, again conditions, simultaneously secrecy, thereby demonstrating optimal terms both parameters. It shown how modify proposed protocols balanced load complexity.
منابع مشابه
Distributed Multi-User Secret Sharing
A distributed secret sharing system is considered that consists of a dealer, n storage nodes, and m users. Each user is given access to a certain subset of storage nodes where it can download the data. The dealer wants to securely convey a specific secret sj to user j via storage nodes, for j “ 1, 2, . . . , m, in such a way that no user gets any information about other users’ secrets in an inf...
متن کاملMulti-Threshold Visual Secret Sharing
Visual cryptography (VC) has been developed extensively based on its practicability. These schemes can encode a black-and-white secret image into several shadow images, and, by stacking a certain number of shadow images, can retrieve the secret image through the human visual system. In this paper, we employ Hsu et al.’s ideal multi-threshold secret sharing scheme based on monotone span programs...
متن کاملMulti-linear Secret-Sharing Schemes
Multi-linear secret-sharing schemes are the most common secret-sharing schemes. In these schemes the secret is composed of some field elements and the sharing is done by applying some fixed linear mapping on the field elements of the secret and some randomly chosen field elements. If the secret contains one field element, then the scheme is called linear. The importance of multi-linear schemes ...
متن کاملDisjunctive Multi-Level Secret Sharing
A disjunctive multi-level secret sharing scheme divides users into different levels. Each level L is associated with a threshold tL, and a group of users can only recover the secret if, for some L, there are at least tL users at levels 0....L in the group. We present a simple ideal disjunctive multi-level secret sharing scheme – in fact, the simplest and most direct scheme to date. It is the fi...
متن کاملDynamic Multi-Secret Sharing Scheme
Secret sharing schemes are very important techniques for the key management. To provide more efficient and flexible alternatives for the applications of secret sharing, this paper presents a dynamic multi-secret sharing scheme. A significant characteristic of the proposed scheme is that each participant has to keep only one master secret share which can be used to reconstruct different group se...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Theory
سال: 2021
ISSN: ['0018-9448', '1557-9654']
DOI: https://doi.org/10.1109/tit.2020.3028194