Linear threshold multisecret sharing schemes

In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here information-theoretic secure schemes with multithreshold access structures. Namely, for every subset P of k users there is...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلفون الرئيسيون: Farràs, Oriol, Gracia, Ignacio, Martín, Sebastià, Padró, Carles
مؤلفون آخرون: School of Physical and Mathematical Sciences
التنسيق: مقال
اللغة:English
منشور في: 2013
الوصول للمادة أونلاين:https://hdl.handle.net/10356/101197
http://hdl.handle.net/10220/16730
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
المؤسسة: Nanyang Technological University
اللغة: English
id sg-ntu-dr.10356-101197
record_format dspace
spelling sg-ntu-dr.10356-1011972020-03-07T12:31:31Z Linear threshold multisecret sharing schemes Farràs, Oriol Gracia, Ignacio Martín, Sebastià Padró, Carles School of Physical and Mathematical Sciences In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here information-theoretic secure schemes with multithreshold access structures. Namely, for every subset P of k users there is a secret key that can only be computed when at least t of them put together their secret information. Coalitions with at most w users with less than t of them in P cannot obtain any information about the secret associated to P. The main parameters to optimize are the length of the shares and the amount of random bits that are needed to set up the distribution of shares, both in relation to the length of the secret. In this paper, we provide lower bounds on this parameters. Moreover, we present an optimal construction for t=2 and k=3. 2013-10-23T07:09:01Z 2019-12-06T20:35:07Z 2013-10-23T07:09:01Z 2019-12-06T20:35:07Z 2012 2012 Journal Article Farràs, O., Gracia, I., Martín, S., & Padró, C. (2012). Linear threshold multisecret sharing schemes. Information Processing Letters, 112(17-18), 667-673. 0020-0190 https://hdl.handle.net/10356/101197 http://hdl.handle.net/10220/16730 10.1016/j.ipl.2012.05.008 en Information processing letters © 2012 Elsevier B.V.
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
description In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here information-theoretic secure schemes with multithreshold access structures. Namely, for every subset P of k users there is a secret key that can only be computed when at least t of them put together their secret information. Coalitions with at most w users with less than t of them in P cannot obtain any information about the secret associated to P. The main parameters to optimize are the length of the shares and the amount of random bits that are needed to set up the distribution of shares, both in relation to the length of the secret. In this paper, we provide lower bounds on this parameters. Moreover, we present an optimal construction for t=2 and k=3.
author2 School of Physical and Mathematical Sciences
author_facet School of Physical and Mathematical Sciences
Farràs, Oriol
Gracia, Ignacio
Martín, Sebastià
Padró, Carles
format Article
author Farràs, Oriol
Gracia, Ignacio
Martín, Sebastià
Padró, Carles
spellingShingle Farràs, Oriol
Gracia, Ignacio
Martín, Sebastià
Padró, Carles
Linear threshold multisecret sharing schemes
author_sort Farràs, Oriol
title Linear threshold multisecret sharing schemes
title_short Linear threshold multisecret sharing schemes
title_full Linear threshold multisecret sharing schemes
title_fullStr Linear threshold multisecret sharing schemes
title_full_unstemmed Linear threshold multisecret sharing schemes
title_sort linear threshold multisecret sharing schemes
publishDate 2013
url https://hdl.handle.net/10356/101197
http://hdl.handle.net/10220/16730
_version_ 1681047216882450432