DocumentCode :
586627
Title :
Consideration for multi-threshold multi-secret sharing schemes
Author :
Waseda, Atsushi ; Soshi, Masakazu
Author_Institution :
Nat. Inst. of Inf. & Commun. Technol., Koganei, Japan
fYear :
2012
fDate :
28-31 Oct. 2012
Firstpage :
265
Lastpage :
269
Abstract :
In this paper, we propose the new (ti, n) threshold multi secret sharing scheme. In our scheme, each user keeps only one share and the secret vectors Ki = {ki,1,..., ki,mi} are shared according to independent (ti, n) threshold access structures (i = l,..., h). Here note that a (ti, n) threshold multi-secret sharing scheme has been proposed by Shi et al. [1]. Unfortunately, however, there is a serious attack on Shi´s scheme that can reconstruct all elements of Ki with only t1 shares. In this paper, we shall give the solution to this problem by using one-way functions. Furthermore, Shi´s scheme has a drawback such that the dimension of the secret vector Ki cannot exceed ti. On the other hand, our scheme has no such a restriction. Finally, we demonstrate that our scheme is more efficient than Shi´s scheme by showing that our scheme is more efficient than the three naive improvements on the protocol of Shi et al.
Keywords :
data privacy; information theory; vectors; Shi scheme; information theory; multithreshold multisecret sharing scheme; one-way function; protocol; secret vector dimension; threshold access structure; Cryptography; Equations; Helium; Mathematical model; Protocols; Vectors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory and its Applications (ISITA), 2012 International Symposium on
Conference_Location :
Honolulu, HI
Print_ISBN :
978-1-4673-2521-9
Type :
conf
Filename :
6400932
Link To Document :
بازگشت