On the Secret Sharing Scheme Based on Supercodes Decoding

被引:0
|
作者
Ivanov, Fedor [1 ,2 ]
Kreschuk, Alexey [1 ,2 ]
Krouk, Eugenii [1 ]
机构
[1] Natl Res Univ Higher Sch Econ, Moscow, Russia
[2] Inst Informat Transmiss Problems, Moscow, Russia
来源
IFAC PAPERSONLINE | 2020年 / 53卷 / 02期
关键词
LDPC codes; iterative decoding; supercodes decoding; secret sharing; quasi-cyclic LDPC codes; signal-noise ratio;
D O I
10.1016/j.ifacol.2020.12.260
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret sharing schemes have been studied intensively for the last 20 years, and these schemes have a number of real-world applications. There are a number of approaches to the construction of secret sharing schemes. One of them is based on codes of forward error correction (FEC). In fact, every linear code can be used to construct secret sharing schemes. For instance original Shamir secret sharing scheme is based on erasure decoding of Reed-Solomon codes. One of the main drawbacks of secret sharing schemes based on FEC is a dependence between number of users (participants) and field size of FEC. In this paper we propose a new scheme of secret sharing based on iterative decoding of LDPC codes in terms of supercodes decoding concept. In this scheme a field size can be made arbitrary and independent on the number of participants. Copyright (C) 2020 The Authors.
引用
收藏
页码:11108 / 11113
页数:6
相关论文
共 50 条
  • [31] Implementations of a Hash Function Based Secret Sharing Scheme
    Chum, Chi Sing
    Zhang, Xiaowen
    JOURNAL OF APPLIED SECURITY RESEARCH, 2015, 10 (04) : 525 - 542
  • [32] Searchable Encryption of Image based on Secret Sharing Scheme
    Kamal, Ahmad Akmal Aminuddin Mohd
    Iwamura, Keiichi
    Kang, Hyunho
    2017 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC 2017), 2017, : 1495 - 1503
  • [33] New secret sharing scheme based on linear code
    Tan X.
    Wang Z.
    Applied Mathematics-A Journal of Chinese Universities, 2004, 19 (2) : 160 - 166
  • [34] A forward-secure scheme based on secret sharing
    Zhang, Jing
    Wei, Feng
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 1134 - 1138
  • [35] NEW SECRET SHARING SCHEME BASED ON LINEAR CODE
    Tan Xiaoqing Wang ZhiguoDept.of Math.
    AppliedMathematics:AJournalofChineseUniversities, 2004, (02) : 160 - 166
  • [36] Outsourcing secret sharing scheme based on homomorphism encryption
    Zhang, En
    Peng, Jie
    Li, Ming
    IET INFORMATION SECURITY, 2018, 12 (01) : 94 - 99
  • [37] A Multiple Secret Sharing Scheme based on Matrix Projection
    Wang, Kai
    Zou, Xukai
    Sui, Yan
    2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2009, : 400 - 405
  • [38] Secret image sharing scheme based solely on ADDITION
    Tsai, M. -H.
    Chen, C. -K.
    Chen, Y. -F.
    Chan, Y. -K.
    Chen, K. -C.
    Chu, Y. -P.
    IMAGING SCIENCE JOURNAL, 2008, 56 (04): : 183 - 188
  • [39] A Lossless Secret Image Sharing Scheme Based on Steganography
    Li, Li
    Abd El-Latif, Ahmed A.
    Yan, Xuehu
    Wang, Shen
    Niu, Xiamu
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 1247 - 1250
  • [40] A secret file sharing scheme with chaos based encryption
    Sharma, Madhu
    Sharma, Ashish
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,