Secret Sharing Schemes for Graph-Based Prohibited Structures
نویسندگان
چکیده
K e y w o r d s C r y p t o g r a p h y , Data security, Information theory, Secret sharing scheme. 1 . I N T R O D U C T I O N In 1987, I to et al. [1] desc r ibed a genera l m e t h o d of secret shar ing cal led Secret Sharing Scheme (SSS) which allows a m a s t e r key to be sha red among a finite set of p a r t i c i p a n t s in such a way t h a t on ly ce r ta in prespecif ied subse ts of p a r t i c i p a n t s can recover the mas t e r key. Let P be t he set of pa r t i c ipan t s . T h e set of all subse ts of P , deno ted by 2 P, is cal led the power set of P . We use the n o t a t i o n X \ Y = {x I x E X and x ~ Y} to denote t he difference of two sets X and Y. T h e col lect ion of subse t s of pa r t i c i pan t s t h a t can recons t ruc t t he m a s t e r key in th i s way is cal led access structure (deno ted by F) . T h e col lect ion of subse ts of p a r t i c i p a n t s t h a t canno t r econs t ruc t the mas t e r key is ca l led prohibited structure (denoted by A ) [2]. T h e n a t u r a l r es t r i c t ion is t h a t r is m o n o t o n e increas ing and A is mono tone decreasing, t h a t is, if A E F and A C_ B C P , if A E A and B C_ A C_ P , then B ~ F,
منابع مشابه
Secret Sharing in Graph-Based Prohibited Structures
A secret sharing scheme for the prohibited structure is a method of sharing a master key among a finite set of participants in such a way that only certain pre-specified subsets of participants cannot recover the master key. A secret sharing scheme is called perfect if any subset of participants who cannot recover the master key obtains no information regarding the master key. In this paper, we...
متن کاملA Skilled Secret Sharing Scheme for r-Uniform Hypergraph-Based Prohibited Structures
Secret sharing is that a dealer distributes a piece of information (called a share) about a secret to each participant such that authorized subsets of participants can reconstruct the secret but unauthorized subsets of participants cannot determine the secret. If any unauthorized subset of participants can not obtain any more information regarding the secret, then the scheme is called perfect. ...
متن کاملSecurity Analysis of a Hash-Based Secret Sharing Scheme
Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملLinear Secret-Sharing Schemes for Forbidden Graph Access Structures
A secret-sharing scheme realizes the forbidden graph access structure determined by a graph G = (V,E) if a pair of vertices can reconstruct the secret if and only if it is an edge in G. Secret-sharing schemes for forbidden graph access structures of bipartite graphs are equivalent to conditional disclosure of secrets protocols, a primitive that is used to construct attributed-based encryption s...
متن کاملA Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions
A non-interactive (t,n)-publicly veriable secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for<...
متن کامل