An Efficient Multi-secret Sharing Scheme with the Quasi-threshold Multipartite Access Structure

被引:1
|
作者
Shi, Runhua [1 ]
Huang, Liusheng [1 ]
Yang, Wei [1 ]
Zhong, Hong [1 ]
机构
[1] USTC, Dept CS & Tech, NHPCC, Hefei 230027, Peoples R China
关键词
secret sharing; access structure; threshold; multipartite; multi-secret;
D O I
10.1109/NSWCTC.2009.263
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In real world, there are many important applications for the secret sharing with the quasi-threshold multipartite access structure. But there was still not a very efficient scheme proposed in the past. In this paper, we combine the multi-secret sharing and the quasi-threshold multipartite access structure, and present an efficient multi-secret sharing scheme with the quasi-threshold multipartite access structure based on Shamir's secret sharing scheme. In this scheme, the participants of any authorized subset can reconstruct multiple secrets by repeatedly using the Lagrange interpolation formula during a sharing process, but any non-authorized subset cannot recover any secret. In addition, the share is the same size of the single shared secret. Thus, it is an efficient and ideal multi-secret sharing scheme with the quasi-threshold multipartite access structure.
引用
收藏
页码:151 / 154
页数:4
相关论文
共 50 条
  • [21] A new (t, n)-threshold multi-secret sharing scheme
    Li, HX
    Cheng, CT
    Pang, LJ
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 421 - 426
  • [22] Identity (ID)-based threshold multi-secret sharing scheme
    Pang, Liao-Jun
    Pei, Qing-Qi
    Jiao, Li-Cheng
    Wang, Yu-Min
    Ruan Jian Xue Bao/Journal of Software, 2008, 19 (10): : 2739 - 2745
  • [23] A Distributed Multi-secret Sharing Scheme on the (t,n) Threshold
    Chen, Guiqiang
    Wang, Huanwen
    Wang, Liqin
    Jin, Yue
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 358 - +
  • [24] New Secret Sharing Scheme for Multipartite Access Structures with Threshold Changeability
    Tentu, Appala Naidu
    Mahapatra, Banita
    Venkaiah, V. Ch.
    Prasad, V. Kamakshi
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1910 - 1916
  • [25] A Secure and Efficient (t, n) Multi-Secret Sharing Scheme
    PANG Liao-jun
    WuhanUniversityJournalofNaturalSciences, 2005, (01) : 191 - 194
  • [26] Multi-secret Threshold Sharing Scheme Based on Chinese Remainder Theorem
    Song, Yinong
    Li, Zichen
    2024 4TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING, ICICSE 2024, 2024, : 131 - 135
  • [27] An efficient (t, n) multi-secret sharing scheme with verification
    Pang, L. J.
    Li, H. X.
    Jiao, L. C.
    Wang, Y. M.
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 552 - 557
  • [28] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [29] An efficient Boolean based multi-secret image sharing scheme
    Amitava Nag
    Jyoti Prakash Singh
    Amit Kumar Singh
    Multimedia Tools and Applications, 2020, 79 : 16219 - 16243
  • [30] An efficient Boolean based multi-secret image sharing scheme
    Nag, Amitava
    Singh, Jyoti Prakash
    Singh, Amit Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (23-24) : 16219 - 16243