4 Secret Sharing over the Reals
نویسندگان
چکیده
We would like to thank Shai Ben-David, Oded Goldreich and Hugo Krawczyk for helpful discussions on the topics of this paper. We would also like to thank Bob Blakley for acquainting us with his work 8, 9]. In this section we deal with secret-sharing schemes over the real numbers. Although it has no practical implications, it is interesting to ask the question whether secret-sharing schemes do not exist over every innnite set, or maybe some properties of countable sets are the cause of the results of section 2. We introduce a simple secret-sharing scheme using real numbers. Since there is a 1 ? 1 and onto transformation from the real numbers to the unit interval 0; 1), it is more convenient to use this interval as the set of secrets. We use the same interval as the set of shares, as it allows us to use the uniform probability distribution. We rst have to deene what we mean by a secret-sharing scheme over the reals. More speciically, we have to deene what we mean by saying that no \illegal" set (i.e., T = 2 F n) of shares reveals any information about the secret. All the schemes we present in this section are perfect (= 1), and therefore is omitted from the notations. The following natural deenition is used: For every two secrets a 1 ; a 2 2 A, for any set of indices T = 2 F n and for any jTj-tuple of measurable sets fC i g i2T 0; 1) the following holds: Pr(8i 2 T : s i 2 C i j a 1) = Pr(8i 2 T : s i 2 C i j a 2) We can now present a secret-sharing scheme for every good family of sets F n (n 2), using ideas that were used in the nite case 4, 5]. We rst introduce a (k; k) secret-sharing scheme which distributes a secret a taken from the interval 0; 1). We use the Lebesgue measure on 0; 1). interval 0; 1). 2. Choose s k 2 0; 1) which satisses s 1 + : : : + s k?1 + s k = a (mod 1). The proof that this is indeed a secret-sharing scheme is similar to the proof of its analogue in the nite case. For introducing a F n secret-sharing scheme for every good family of sets F n …
منابع مشابه
Security Analysis of a Hash-Based Secret Sharing Scheme
Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...
متن کاملA Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions
A non-interactive (t,n)-publicly veriable secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for<...
متن کاملAn Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves
In a (t,n)-threshold secret sharing scheme, a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together, but no group of fewer than t participants can do. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao, and the intractability of the elliptic curve discrete logar...
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملOn the design and security of a lattice-based threshold secret sharing scheme
In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1989