Linear threshold multisecret sharing schemes

In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here information-theoretic secure schemes with multithreshold access structures. Namely, for every subset P of k users there is...

Full description

Saved in:
Bibliographic Details
Main Authors: Farràs, Oriol, Gracia, Ignacio, Martín, Sebastià, Padró, Carles
Other Authors: School of Physical and Mathematical Sciences
Format: Article
Language:English
Published: 2013
Online Access:https://hdl.handle.net/10356/101197
http://hdl.handle.net/10220/16730
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-101197
record_format dspace
spelling sg-ntu-dr.10356-1011972020-03-07T12:31:31Z Linear threshold multisecret sharing schemes Farràs, Oriol Gracia, Ignacio Martín, Sebastià Padró, Carles School of Physical and Mathematical Sciences In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here information-theoretic secure schemes with multithreshold access structures. Namely, for every subset P of k users there is a secret key that can only be computed when at least t of them put together their secret information. Coalitions with at most w users with less than t of them in P cannot obtain any information about the secret associated to P. The main parameters to optimize are the length of the shares and the amount of random bits that are needed to set up the distribution of shares, both in relation to the length of the secret. In this paper, we provide lower bounds on this parameters. Moreover, we present an optimal construction for t=2 and k=3. 2013-10-23T07:09:01Z 2019-12-06T20:35:07Z 2013-10-23T07:09:01Z 2019-12-06T20:35:07Z 2012 2012 Journal Article Farràs, O., Gracia, I., Martín, S., & Padró, C. (2012). Linear threshold multisecret sharing schemes. Information Processing Letters, 112(17-18), 667-673. 0020-0190 https://hdl.handle.net/10356/101197 http://hdl.handle.net/10220/16730 10.1016/j.ipl.2012.05.008 en Information processing letters © 2012 Elsevier B.V.
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
description In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here information-theoretic secure schemes with multithreshold access structures. Namely, for every subset P of k users there is a secret key that can only be computed when at least t of them put together their secret information. Coalitions with at most w users with less than t of them in P cannot obtain any information about the secret associated to P. The main parameters to optimize are the length of the shares and the amount of random bits that are needed to set up the distribution of shares, both in relation to the length of the secret. In this paper, we provide lower bounds on this parameters. Moreover, we present an optimal construction for t=2 and k=3.
author2 School of Physical and Mathematical Sciences
author_facet School of Physical and Mathematical Sciences
Farràs, Oriol
Gracia, Ignacio
Martín, Sebastià
Padró, Carles
format Article
author Farràs, Oriol
Gracia, Ignacio
Martín, Sebastià
Padró, Carles
spellingShingle Farràs, Oriol
Gracia, Ignacio
Martín, Sebastià
Padró, Carles
Linear threshold multisecret sharing schemes
author_sort Farràs, Oriol
title Linear threshold multisecret sharing schemes
title_short Linear threshold multisecret sharing schemes
title_full Linear threshold multisecret sharing schemes
title_fullStr Linear threshold multisecret sharing schemes
title_full_unstemmed Linear threshold multisecret sharing schemes
title_sort linear threshold multisecret sharing schemes
publishDate 2013
url https://hdl.handle.net/10356/101197
http://hdl.handle.net/10220/16730
_version_ 1681047216882450432