Secret Sharing Schemes with Veto Capabilities
نویسندگان
چکیده
A secret sharing scheme permits a secret to be shared among participants in such a way that only qualiied subsets of participants can recover the secret, but any non-qualiied subset has absolutely no information on the secret. In this paper we consider the problem of designing eecient secret sharing schemes having the additional feature that qualiied minorities can forbid any other set of participants from reconstructing the secret key. This problem was rst considered by Beutelspacher 2] who gave an algorithm, based on projective geometries, to construct threshold schemes in which qualiied minorities have this \veto" capability. We show that well known tools from Error Correcting Coding Theory allow to modify the classical Shamir secret sharing algorithm 22] to handle this more general problem.
منابع مشابه
Security Analysis of a Hash-Based Secret Sharing Scheme
Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...
متن کاملVeto is Impossible in Secret Sharing Schemes
Beutelspacher considered a secret sharing scheme having a veto capability such that quali ed minorities can prevent any other set of participants from reconstructing the secret. In this paper, we prove that there exist no such schemes if we do not assume that the reconstruction machine is trustworthy.
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملOn Secret Sharing Schemes with Extended Capabilities
Secret sharing allows split control over the secret. Secret parts known as secret shares are distributed to different shareholders (locations). Secret can be recovered upon combination of sufficient number of shares. Research into theoretical foundations, development of widespread applications, as well as, new attacks resulted in great need for extra features of existing schemes. We describe ex...
متن کاملVisual Cryptography Schemes with Veto Capabilities
Beutelspacher considered a secret sharing scheme having a veto capability. Obana and Kurosawa proved that there exist no such schemes if we do not assume that the reconstruction machine is trustworthy. Special kind of secret sharing schemes are Visual Cryptography Schemes (VCS). In this paper, we analyze visual cryptography schemes with veto capabilities in which the reconstruction of black pix...
متن کامل