Linear threshold multisecret sharing schemes
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here information-theoretic secure schemes with multithreshold access structures. Namely, for every subset P of k users there is...
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2013
|
Online Access: | https://hdl.handle.net/10356/101197 http://hdl.handle.net/10220/16730 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-101197 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1011972020-03-07T12:31:31Z Linear threshold multisecret sharing schemes Farràs, Oriol Gracia, Ignacio Martín, Sebastià Padró, Carles School of Physical and Mathematical Sciences In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here information-theoretic secure schemes with multithreshold access structures. Namely, for every subset P of k users there is a secret key that can only be computed when at least t of them put together their secret information. Coalitions with at most w users with less than t of them in P cannot obtain any information about the secret associated to P. The main parameters to optimize are the length of the shares and the amount of random bits that are needed to set up the distribution of shares, both in relation to the length of the secret. In this paper, we provide lower bounds on this parameters. Moreover, we present an optimal construction for t=2 and k=3. 2013-10-23T07:09:01Z 2019-12-06T20:35:07Z 2013-10-23T07:09:01Z 2019-12-06T20:35:07Z 2012 2012 Journal Article Farràs, O., Gracia, I., Martín, S., & Padró, C. (2012). Linear threshold multisecret sharing schemes. Information Processing Letters, 112(17-18), 667-673. 0020-0190 https://hdl.handle.net/10356/101197 http://hdl.handle.net/10220/16730 10.1016/j.ipl.2012.05.008 en Information processing letters © 2012 Elsevier B.V. |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
description |
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here information-theoretic secure schemes with multithreshold access structures. Namely, for every subset P of k users there is a secret key that can only be computed when at least t of them put together their secret information. Coalitions with at most w users with less than t of them in P cannot obtain any information about the secret associated to P. The main parameters to optimize are the length of the shares and the amount of random bits that are needed to set up the distribution of shares, both in relation to the length of the secret. In this paper, we provide lower bounds on this parameters. Moreover, we present an optimal construction for t=2 and k=3. |
author2 |
School of Physical and Mathematical Sciences |
author_facet |
School of Physical and Mathematical Sciences Farràs, Oriol Gracia, Ignacio Martín, Sebastià Padró, Carles |
format |
Article |
author |
Farràs, Oriol Gracia, Ignacio Martín, Sebastià Padró, Carles |
spellingShingle |
Farràs, Oriol Gracia, Ignacio Martín, Sebastià Padró, Carles Linear threshold multisecret sharing schemes |
author_sort |
Farràs, Oriol |
title |
Linear threshold multisecret sharing schemes |
title_short |
Linear threshold multisecret sharing schemes |
title_full |
Linear threshold multisecret sharing schemes |
title_fullStr |
Linear threshold multisecret sharing schemes |
title_full_unstemmed |
Linear threshold multisecret sharing schemes |
title_sort |
linear threshold multisecret sharing schemes |
publishDate |
2013 |
url |
https://hdl.handle.net/10356/101197 http://hdl.handle.net/10220/16730 |
_version_ |
1681047216882450432 |