Two Optimum Secret Sharing Schemes Revisited

被引:1
|
作者
Cao, Zhengjun [1 ,2 ]
Markowitch, Olivier [1 ,2 ]
机构
[1] Univ Libre Bruxelles, Dept Comp Sci, Brussels, Belgium
[2] Shanghai Univ, Dept Math, Shanghai 200041, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1109/FITME.2008.95
中图分类号
F [经济];
学科分类号
02 ;
摘要
In 2006, Obana et al proposed two optimum secret sharing schemes secure against cheating. They extend the secret s in the Shamir's scheme to an array of three elements, (s, e(0), e(1)), and construct two equations for checking validity. Each item in the equations should be reconstructed using Lagrange's interpolation. In this paper we revisit these schemes by introducing a public hash function to construct equations for checking validity The revisited schemes become more efficient because they only extend the secret to an array of two elements. The new scheme for a single secret saves about 1/3 cost of the original.
引用
收藏
页码:157 / +
页数:2
相关论文
共 50 条
  • [41] The Latin squares and the secret sharing schemes
    Chum, Chi Sing
    Zhang, Xiaowen
    GROUPS COMPLEXITY CRYPTOLOGY, 2010, 2 (02) : 175 - 202
  • [42] SOME IDEAL SECRET SHARING SCHEMES
    BRICKELL, EF
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 468 - 475
  • [43] On secret sharing schemes, matroids and polymatroids
    Marti-Farre, Jaume
    Padro, Carles
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2010, 4 (02) : 95 - 120
  • [44] Veto is impossible in secret sharing schemes
    Obana, S
    Kurosawa, K
    INFORMATION PROCESSING LETTERS, 1996, 58 (06) : 293 - 295
  • [46] Ideal multipartite secret sharing schemes
    Farras, Oriol
    Marti-Farre, Jaume
    Padro, Carles
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 448 - +
  • [47] Probability of shares in secret sharing schemes
    Blundo, C
    De Santis, A
    Gaggia, AG
    INFORMATION PROCESSING LETTERS, 1999, 72 (5-6) : 169 - 175
  • [48] On the bound for anonymous secret sharing schemes
    Kishimoto, W
    Okada, K
    Kurosawa, K
    Ogata, W
    DISCRETE APPLIED MATHEMATICS, 2002, 121 (1-3) : 193 - 202
  • [49] Weighted threshold secret sharing schemes
    Morillo, P
    Padró, C
    Sáez, G
    Villar, JL
    INFORMATION PROCESSING LETTERS, 1999, 70 (05) : 211 - 216
  • [50] REUSING SHARES IN SECRET SHARING SCHEMES
    ZHENG, YL
    HARDJONO, T
    SEBERRY, J
    COMPUTER JOURNAL, 1994, 37 (03): : 199 - 205