DocumentCode :
3092676
Title :
Efficient Ideal Threshold Secret Sharing Schemes Based on EXCLUSIVE-OR Operations
Author :
Lv, Chunli ; Jia, Xiaoqi ; Tian, Lijun ; Jing, Jiwu ; Sun, Mingli
Author_Institution :
State Key Lab. of Inf. Security, Grad. Univ. of Chinese Acad. of Sci., Beijing, China
fYear :
2010
fDate :
1-3 Sept. 2010
Firstpage :
136
Lastpage :
143
Abstract :
Most of secret sharing schemes have to be computed in a Galois field, such as Shamir´s scheme, which have relatively heavy computational cost. Kurihara et al. recently proposed a fast secret sharing scheme using only Exclusive-OR(XOR) operations to make shares and recover the secret. Their proposed scheme was shown to be hundreds of times faster than Shamir´s (in GF(q=264)) in terms of both distribution and recovery with a 4.5 MB secret when k=3 and n=11. However, some steps in their scheme still need to be improved. Their security proofs were too complex and difficult to be understood and verified intuitively. In this paper, we present a conciser, cleaner, faster scheme which is also based on XOR. Moreover, we give two geometric explanations of making shares in both our and Kurihara´s schemes respectively, which would help to easier and further understand how the shares are made in the two schemes.
Keywords :
cryptography; exclusive-OR operations; geometric explanations; ideal threshold secret sharing schemes; Algebra; Arrays; Cryptography; Memory; Polynomials; XOR; array code; high performance; secret sharing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network and System Security (NSS), 2010 4th International Conference on
Conference_Location :
Melbourne, VIC
Print_ISBN :
978-1-4244-8484-3
Electronic_ISBN :
978-0-7695-4159-4
Type :
conf
DOI :
10.1109/NSS.2010.82
Filename :
5636099
Link To Document :
بازگشت