On the Secret Sharing Scheme Based on Supercodes Decoding

被引:0
|
作者
Ivanov, Fedor [1 ,2 ]
Kreschuk, Alexey [1 ,2 ]
Krouk, Eugenii [1 ]
机构
[1] Natl Res Univ Higher Sch Econ, Moscow, Russia
[2] Inst Informat Transmiss Problems, Moscow, Russia
来源
IFAC PAPERSONLINE | 2020年 / 53卷 / 02期
关键词
LDPC codes; iterative decoding; supercodes decoding; secret sharing; quasi-cyclic LDPC codes; signal-noise ratio;
D O I
10.1016/j.ifacol.2020.12.260
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret sharing schemes have been studied intensively for the last 20 years, and these schemes have a number of real-world applications. There are a number of approaches to the construction of secret sharing schemes. One of them is based on codes of forward error correction (FEC). In fact, every linear code can be used to construct secret sharing schemes. For instance original Shamir secret sharing scheme is based on erasure decoding of Reed-Solomon codes. One of the main drawbacks of secret sharing schemes based on FEC is a dependence between number of users (participants) and field size of FEC. In this paper we propose a new scheme of secret sharing based on iterative decoding of LDPC codes in terms of supercodes decoding concept. In this scheme a field size can be made arbitrary and independent on the number of participants. Copyright (C) 2020 The Authors.
引用
收藏
页码:11108 / 11113
页数:6
相关论文
共 50 条
  • [21] Blockchain Data Sharing Query Scheme based on Threshold Secret Sharing
    Chen, Lu
    Zhang, Xin
    Sun, Zhixin
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [22] A novel extended secret image sharing scheme based on sharing matrix
    Li, Xiaopeng
    Fu, Zhengxin
    Yu, Bin
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2024, 101
  • [23] Linear Equation Based Visual Secret Sharing Scheme
    Bunker, Subhash Chand
    Barasa, Mayur
    Ojha, Aparajita
    SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, : 406 - 410
  • [24] Repeated game based secret sharing scheme in IOT
    Li, Da-Wei
    Yang, Geng
    Tongxin Xuebao/Journal on Communications, 2010, 31 (9 A): : 97 - 103
  • [25] A Matrix-Based Secret Sharing Scheme for Images
    del Rey, A. Martin
    PROGRESS IN PATTERN RECOGNITION, IMAGE ANALYSIS AND APPLICATIONS, PROCEEDINGS, 2008, 5197 : 635 - 642
  • [26] Rational secret sharing scheme based on Markov decision
    Tian, You-Liang
    Wang, Xue-Mei
    Liu, Lin-Fang
    Tongxin Xuebao/Journal on Communications, 2015, 36 (09): : 222 - 229
  • [27] A verifiable threshold secret sharing scheme based on lattices
    Rajabi, Bahman
    Eslami, Ziba
    INFORMATION SCIENCES, 2019, 501 : 655 - 661
  • [28] An asymmetric multicast fingerprinting scheme based on secret sharing
    Ren Yanzhen
    Hu RuiMin
    Ai Haojun
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 211 - 214
  • [29] A new ideal secret sharing scheme based on a tree
    Meriem, Ghanem
    Bouroubi, Sadek
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (01): : 121 - 138
  • [30] Threshold Signature Scheme Based on Modular Secret Sharing
    Xie, Qi
    Shen, Zhonghua
    Yu, Xiuyuan
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 1003 - +