In 2006, Obana et al proposed two optimum secret sharing schemes secure against cheating. They extend the secret s in the Shamir's scheme to an array of three elements, (s, e(0), e(1)), and construct two equations for checking validity. Each item in the equations should be reconstructed using Lagrange's interpolation. In this paper we revisit these schemes by introducing a public hash function to construct equations for checking validity The revisited schemes become more efficient because they only extend the secret to an array of two elements. The new scheme for a single secret saves about 1/3 cost of the original.
机构:
Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, ItalyUniv Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, Italy
Blundo, C
论文数: 引用数:
h-index:
机构:
De Santis, A
Gaggia, AG
论文数: 0引用数: 0
h-index: 0
机构:
Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, ItalyUniv Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, Italy