62,865 research outputs found
An Epitome of Multi Secret Sharing Schemes for General Access Structure
Secret sharing schemes are widely used now a days in various applications,
which need more security, trust and reliability. In secret sharing scheme, the
secret is divided among the participants and only authorized set of
participants can recover the secret by combining their shares. The authorized
set of participants are called access structure of the scheme. In Multi-Secret
Sharing Scheme (MSSS), k different secrets are distributed among the
participants, each one according to an access structure. Multi-secret sharing
schemes have been studied extensively by the cryptographic community. Number of
schemes are proposed for the threshold multi-secret sharing and multi-secret
sharing according to generalized access structure with various features. In
this survey we explore the important constructions of multi-secret sharing for
the generalized access structure with their merits and demerits. The features
like whether shares can be reused, participants can be enrolled or dis-enrolled
efficiently, whether shares have to modified in the renewal phase etc., are
considered for the evaluation
An ideal multi-secret sharing scheme based on minimal privileged coalitions
How to construct an ideal multi-secret sharing scheme for general access
structures is difficult. In this paper, we solve an open problem proposed by
Spiez et al.recently [Finite Fields and Their Application, 2011(17) 329-342],
namely to design an algorithm of privileged coalitions of any length if such
coalitions exist. Furthermore, in terms of privileged coalitions, we show that
most of the existing multi-secret sharing schemes based on Shamir threshold
secret sharing are not perfect by analyzing Yang et al.'s scheme and Pang et
al.'s scheme. Finally, based on the algorithm mentioned above, we devise an
ideal multi-secret sharing scheme for families of access structures, which
possesses more vivid authorized sets than that of the threshold scheme.Comment: 13page
Efficient Multi-Party Quantum Secret Sharing Schemes
In this work, we generalize the quantum secret sharing scheme of Hillary,
Bu\v{z}ek and Berthiaume[Phys. Rev. A59, 1829(1999)] into arbitrary
multi-parties. Explicit expressions for the shared secret bit is given. It is
shown that in the Hillery-Bu\v{z}ek-Berthiaume quantum secret sharing scheme
the secret information is shared in the parity of binary strings formed by the
measured outcomes of the participants. In addition, we have increased the
efficiency of the quantum secret sharing scheme by generalizing two techniques
from quantum key distribution. The favored-measuring-basis Quantum secret
sharing scheme is developed from the Lo-Chau-Ardehali technique[H. K. Lo, H. F.
Chau and M. Ardehali, quant-ph/0011056] where all the participants choose their
measuring-basis asymmetrically, and the measuring-basis-encrypted Quantum
secret sharing scheme is developed from the Hwang-Koh-Han technique [W. Y.
Hwang, I. G. Koh and Y. D. Han, Phys. Lett. A244, 489 (1998)] where all
participants choose their measuring-basis according to a control key. Both
schemes are asymptotically 100% in efficiency, hence nearly all the GHZ-states
in a quantum secret sharing process are used to generate shared secret
information.Comment: 7 page
Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT
Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use the Asmuth-Bloom sequence are proposed in this paper. All these five secret sharing schemes are based on Chinese Remainder Theorem (CRT) [8]. The first scheme that uses the Mignotte’s sequence is a single secret scheme; the second one is an extension of the first one to Multi-secret sharing scheme. The third scheme is again for the case of multi-secrets but it is an improvement over the second scheme in the sense that it reduces the number of publicvalues. The first scheme that uses the Asmuth-Bloom sequence is designed for the case of a single secret and the second one is an extension of the first scheme to the case of multi-secrets. Novelty of the proposed schemes is that the shares of the participants are reusable i.e. same shares are applicable even with a new secret. Also only one share needs to be kept by each participant even for the muslti-secret sharing scheme. Further, the schemes are capable of verifying the honesty of the participants including the dealer. Correctness of the proposed schemes is discussed and show that the proposed schemes are computationally secure
Generic Secure Repair for Distributed Storage
This paper studies the problem of repairing secret sharing schemes, i.e.,
schemes that encode a message into shares, assigned to nodes, so that
any nodes can decode the message but any colluding nodes cannot infer
any information about the message. In the event of node failures so that shares
held by the failed nodes are lost, the system needs to be repaired by
reconstructing and reassigning the lost shares to the failed (or replacement)
nodes. This can be achieved trivially by a trustworthy third-party that
receives the shares of the available nodes, recompute and reassign the lost
shares. The interesting question, studied in the paper, is how to repair
without a trustworthy third-party. The main issue that arises is repair
security: how to maintain the requirement that any colluding nodes,
including the failed nodes, cannot learn any information about the message,
during and after the repair process? We solve this secure repair problem from
the perspective of secure multi-party computation. Specifically, we design
generic repair schemes that can securely repair any (scalar or vector) linear
secret sharing schemes. We prove a lower bound on the repair bandwidth of
secure repair schemes and show that the proposed secure repair schemes achieve
the optimal repair bandwidth up to a small constant factor when dominates
, or when the secret sharing scheme being repaired has optimal rate. We
adopt a formal information-theoretic approach in our analysis and bounds. A
main idea in our schemes is to allow a more flexible repair model than the
straightforward one-round repair model implicitly assumed by existing secure
regenerating codes. Particularly, the proposed secure repair schemes are simple
and efficient two-round protocols
- …