An Efficient Multi-secret Sharing Scheme with the Quasi-threshold Multipartite Access Structure

被引:1
|
作者
Shi, Runhua [1 ]
Huang, Liusheng [1 ]
Yang, Wei [1 ]
Zhong, Hong [1 ]
机构
[1] USTC, Dept CS & Tech, NHPCC, Hefei 230027, Peoples R China
关键词
secret sharing; access structure; threshold; multipartite; multi-secret;
D O I
10.1109/NSWCTC.2009.263
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In real world, there are many important applications for the secret sharing with the quasi-threshold multipartite access structure. But there was still not a very efficient scheme proposed in the past. In this paper, we combine the multi-secret sharing and the quasi-threshold multipartite access structure, and present an efficient multi-secret sharing scheme with the quasi-threshold multipartite access structure based on Shamir's secret sharing scheme. In this scheme, the participants of any authorized subset can reconstruct multiple secrets by repeatedly using the Lagrange interpolation formula during a sharing process, but any non-authorized subset cannot recover any secret. In addition, the share is the same size of the single shared secret. Thus, it is an efficient and ideal multi-secret sharing scheme with the quasi-threshold multipartite access structure.
引用
收藏
页码:151 / 154
页数:4
相关论文
共 50 条
  • [1] Multi-Secret Sharing Threshold Access Structure
    Reddy, L. Siva
    Prasad, Munaga V. N. K.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1585 - 1590
  • [2] A scheme for threshold multi-secret sharing
    Chan, CW
    Chang, CC
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 1 - 14
  • [3] A threshold multi-secret sharing scheme
    Shi Runhua
    Huang Liusheng
    Luo yonglong
    Zhong Hong
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1705 - +
  • [4] An efficient (t, n)-threshold multi-secret sharing scheme
    Shi Runhua
    Huang Liusheng
    Zhong Hong
    FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 580 - +
  • [5] An Efficient and Secure Multi-Secret Image Sharing Scheme with General Access Structure
    Lee, Ching-Fan
    Juan, Justie Su-Tzu
    2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 253 - 259
  • [6] An Efficient Multi-secret Sharing Scheme with General Access Structures
    Wei Yun
    Zhang Xingkai
    Xiong Guohua
    ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 1246 - 1250
  • [7] Multi-secret sharing scheme based on the general access structure
    Pang, Liaojun
    Jiang, Zhengtao
    Wang, Yumin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2006, 43 (01): : 33 - 38
  • [8] Verifiable threshold multi-secret sharing scheme
    Pang, Liao-Jun
    Li, Hui-Xian
    Li, Zhi-Jie
    Wang, Yu-Min
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2008, 40 (09): : 1462 - 1465
  • [9] A Hierarchical Threshold Multi-secret Sharing Scheme
    Shi Runhua
    Zhong Hong
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 231 - 234
  • [10] A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure
    Alam, Irfan
    Alali, Amal S.
    Ali, Shakir
    Asri, Muhammad S. M.
    AXIOMS, 2024, 13 (08)