An Efficient Multi-secret Sharing Scheme with the Quasi-threshold Multipartite Access Structure

被引:1
|
作者
Shi, Runhua [1 ]
Huang, Liusheng [1 ]
Yang, Wei [1 ]
Zhong, Hong [1 ]
机构
[1] USTC, Dept CS & Tech, NHPCC, Hefei 230027, Peoples R China
关键词
secret sharing; access structure; threshold; multipartite; multi-secret;
D O I
10.1109/NSWCTC.2009.263
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In real world, there are many important applications for the secret sharing with the quasi-threshold multipartite access structure. But there was still not a very efficient scheme proposed in the past. In this paper, we combine the multi-secret sharing and the quasi-threshold multipartite access structure, and present an efficient multi-secret sharing scheme with the quasi-threshold multipartite access structure based on Shamir's secret sharing scheme. In this scheme, the participants of any authorized subset can reconstruct multiple secrets by repeatedly using the Lagrange interpolation formula during a sharing process, but any non-authorized subset cannot recover any secret. In addition, the share is the same size of the single shared secret. Thus, it is an efficient and ideal multi-secret sharing scheme with the quasi-threshold multipartite access structure.
引用
收藏
页码:151 / 154
页数:4
相关论文
共 50 条
  • [41] Design of a new efficient and secure multi-secret images sharing scheme
    Kamel Mohamed Faraoun
    Multimedia Tools and Applications, 2017, 76 : 6247 - 6261
  • [42] Efficient verifiable multi-secret sharing scheme based on hash function
    Shao, Jun
    INFORMATION SCIENCES, 2014, 278 : 104 - 109
  • [43] Dynamic and verifiable threshold multi-secret sharing scheme based on bilinear pairings
    Li, Huina
    ICIC Express Letters, 2015, 9 (10): : 2819 - 2825
  • [44] Design of a new efficient and secure multi-secret images sharing scheme
    Faraoun, Kamel Mohamed
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (05) : 6247 - 6261
  • [45] A verifiable multi-secret sharing scheme (VMSS)
    Pang Liaojun
    Li Huixian
    Jiao Licheng
    Wang Yumin
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 749 - +
  • [46] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [47] A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP
    Shi, Runhua
    Zhong, Hong
    Huang, Liusheng
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 2, PROCEEDINGS, 2007, : 9 - +
  • [48] Verifiable Threshold Scheme in Multi-Secret Sharing Distributions upon Extensions of ECC
    Wang, Shiuh-Jeng
    Tsai, Yuh-Ren
    Shen, Chien-Chih
    WIRELESS PERSONAL COMMUNICATIONS, 2011, 56 (01) : 173 - 182
  • [49] Threshold multi-secret sharing scheme based on phase-shifting interferometry
    Deng, Xiaopeng
    Wen, Wei
    Shi, Zhengang
    OPTICS COMMUNICATIONS, 2017, 387 : 409 - 414
  • [50] On Novel Verifiable Multi-Secret Sharing Scheme
    Wang, Jian
    Liu, Yanheng
    Wang, Yanxi
    ADVANCED SCIENCE LETTERS, 2011, 4 (11-12) : 3709 - 3715