On the Secret Sharing Scheme Based on Supercodes Decoding

被引:0
|
作者
Ivanov, Fedor [1 ,2 ]
Kreschuk, Alexey [1 ,2 ]
Krouk, Eugenii [1 ]
机构
[1] Natl Res Univ Higher Sch Econ, Moscow, Russia
[2] Inst Informat Transmiss Problems, Moscow, Russia
来源
IFAC PAPERSONLINE | 2020年 / 53卷 / 02期
关键词
LDPC codes; iterative decoding; supercodes decoding; secret sharing; quasi-cyclic LDPC codes; signal-noise ratio;
D O I
10.1016/j.ifacol.2020.12.260
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret sharing schemes have been studied intensively for the last 20 years, and these schemes have a number of real-world applications. There are a number of approaches to the construction of secret sharing schemes. One of them is based on codes of forward error correction (FEC). In fact, every linear code can be used to construct secret sharing schemes. For instance original Shamir secret sharing scheme is based on erasure decoding of Reed-Solomon codes. One of the main drawbacks of secret sharing schemes based on FEC is a dependence between number of users (participants) and field size of FEC. In this paper we propose a new scheme of secret sharing based on iterative decoding of LDPC codes in terms of supercodes decoding concept. In this scheme a field size can be made arbitrary and independent on the number of participants. Copyright (C) 2020 The Authors.
引用
收藏
页码:11108 / 11113
页数:6
相关论文
共 50 条
  • [1] A Compact Secret Image Sharing Scheme Based on Flexible Secret Matrix Sharing Scheme
    Wang, Lingfu
    Wang, Jing
    Zhang, Mingwu
    Huang, Weijia
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT III, 2022, 13157 : 411 - 431
  • [2] Generalized Supercodes Decoding
    Abramov, Andrey
    Krouk, Eugenii
    2014 XIV INTERNATIONAL SYMPOSIUM ON PROBLEMS OF REDUNDANCY IN INFORMATION AND CONTROL SYSTEMS (REDUNDANCY), 2014, : 1 - 5
  • [3] A Secret Sharing Scheme Based on AES
    Cui, Jie
    Chen, Lei
    Zhang, Yiming
    Xie, Zhiqiang
    Zhong, Hong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (06): : 295 - 302
  • [4] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Wang, Daoshun
    Yi, Feng
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
  • [5] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Daoshun Wang
    Feng Yi
    EURASIP Journal on Advances in Signal Processing, 2010
  • [6] On the design of a two-decoding-option image secret sharing scheme
    Chen, Tzung-Her
    Lin, Kai-Siang
    Lin, Chih-Hung
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (07) : 7865 - 7881
  • [7] On the design of a two-decoding-option image secret sharing scheme
    Tzung-Her Chen
    Kai-Siang Lin
    Chih-Hung Lin
    Multimedia Tools and Applications, 2018, 77 : 7865 - 7881
  • [8] Proactive Secret Sharing Scheme Suitable for Asymmetric Secret Sharing Scheme
    Kaneko, Naoto
    Iwamura, Keiichi
    2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
  • [9] A signcryption scheme based on secret sharing technique
    Al-Ibrahim, M
    COMPUTER NETWORK SECURITY, 2003, 2776 : 279 - 288
  • [10] Quantum Signature Scheme Based on Secret Sharing
    Xiu-Ju Huang
    Zhen-Zhen Li
    Zi-Chen Li
    International Journal of Theoretical Physics, 61