Secret Sharing Schemes for Graph-Based Prohibited Structures

نویسندگان

  • I N SUN
  • R. O. C.
چکیده

K e y w o r d s C r y p t o g r a p h y , Data security, Information theory, Secret sharing scheme. 1 . I N T R O D U C T I O N In 1987, I to et al. [1] desc r ibed a genera l m e t h o d of secret shar ing cal led Secret Sharing Scheme (SSS) which allows a m a s t e r key to be sha red among a finite set of p a r t i c i p a n t s in such a way t h a t on ly ce r ta in prespecif ied subse ts of p a r t i c i p a n t s can recover the mas t e r key. Let P be t he set of pa r t i c ipan t s . T h e set of all subse ts of P , deno ted by 2 P, is cal led the power set of P . We use the n o t a t i o n X \ Y = {x I x E X and x ~ Y} to denote t he difference of two sets X and Y. T h e col lect ion of subse t s of pa r t i c i pan t s t h a t can recons t ruc t t he m a s t e r key in th i s way is cal led access structure (deno ted by F) . T h e col lect ion of subse ts of p a r t i c i p a n t s t h a t canno t r econs t ruc t the mas t e r key is ca l led prohibited structure (denoted by A ) [2]. T h e n a t u r a l r es t r i c t ion is t h a t r is m o n o t o n e increas ing and A is mono tone decreasing, t h a t is, if A E F and A C_ B C P , if A E A and B C_ A C_ P , then B ~ F,

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secret Sharing in Graph-Based Prohibited Structures

A secret sharing scheme for the prohibited structure is a method of sharing a master key among a finite set of participants in such a way that only certain pre-specified subsets of participants cannot recover the master key. A secret sharing scheme is called perfect if any subset of participants who cannot recover the master key obtains no information regarding the master key. In this paper, we...

متن کامل

A Skilled Secret Sharing Scheme for r-Uniform Hypergraph-Based Prohibited Structures

Secret sharing is that a dealer distributes a piece of information (called a share) about a secret to each participant such that authorized subsets of participants can reconstruct the secret but unauthorized subsets of participants cannot determine the secret. If any unauthorized subset of participants can not obtain any more information regarding the secret, then the scheme is called perfect. ...

متن کامل

Security Analysis of a Hash-Based Secret Sharing Scheme

Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

Linear Secret-Sharing Schemes for Forbidden Graph Access Structures

A secret-sharing scheme realizes the forbidden graph access structure determined by a graph G = (V,E) if a pair of vertices can reconstruct the secret if and only if it is an edge in G. Secret-sharing schemes for forbidden graph access structures of bipartite graphs are equivalent to conditional disclosure of secrets protocols, a primitive that is used to construct attributed-based encryption s...

متن کامل

A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions

A non-interactive (t,n)-publicly veriable secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for<...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003