On the Secret Sharing Scheme Based on Supercodes Decoding

被引:0
|
作者
Ivanov, Fedor [1 ,2 ]
Kreschuk, Alexey [1 ,2 ]
Krouk, Eugenii [1 ]
机构
[1] Natl Res Univ Higher Sch Econ, Moscow, Russia
[2] Inst Informat Transmiss Problems, Moscow, Russia
来源
IFAC PAPERSONLINE | 2020年 / 53卷 / 02期
关键词
LDPC codes; iterative decoding; supercodes decoding; secret sharing; quasi-cyclic LDPC codes; signal-noise ratio;
D O I
10.1016/j.ifacol.2020.12.260
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret sharing schemes have been studied intensively for the last 20 years, and these schemes have a number of real-world applications. There are a number of approaches to the construction of secret sharing schemes. One of them is based on codes of forward error correction (FEC). In fact, every linear code can be used to construct secret sharing schemes. For instance original Shamir secret sharing scheme is based on erasure decoding of Reed-Solomon codes. One of the main drawbacks of secret sharing schemes based on FEC is a dependence between number of users (participants) and field size of FEC. In this paper we propose a new scheme of secret sharing based on iterative decoding of LDPC codes in terms of supercodes decoding concept. In this scheme a field size can be made arbitrary and independent on the number of participants. Copyright (C) 2020 The Authors.
引用
收藏
页码:11108 / 11113
页数:6
相关论文
共 50 条
  • [41] Secret Image Sharing Scheme Based on a Boolean Operation
    Nag, Amitava
    Biswas, Sushanta
    Sarkar, Debasree
    Sarka, Partha Pratim
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2014, 14 (02) : 98 - 113
  • [42] Quantum scheme for secret sharing based on local distinguishability
    Rahaman, Ramij
    Parker, Matthew G.
    PHYSICAL REVIEW A, 2015, 91 (02):
  • [43] A Lattice-Based Threshold Secret Sharing Scheme
    Khorasgani, Hamidreza Amini
    Asaad, Saba
    Eghlidos, Taraneh
    Aref, Mohammadreza
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 173 - 179
  • [44] An Efficient Group-Based Secret Sharing Scheme
    Lv, Chunli
    Jia, Xiaoqi
    Lin, Jingqiang
    Jing, Jiwu
    Tian, Lijun
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 288 - 301
  • [45] XOR-Based Hierarchical Secret Sharing Scheme
    Shima, Koji
    Doi, Hiroshi
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2018, 2018, 11049 : 206 - 223
  • [46] A Leakproof Secret Sharing Scheme Based on Environment Sensing
    Qin, Huawang
    Zhu, Xiaohua
    Dai, Yuewei
    MATERIALS SCIENCE AND PROCESSING, ENVIRONMENTAL ENGINEERING AND INFORMATION TECHNOLOGIES, 2014, 665 : 647 - 653
  • [47] A framework for counting based secret sharing scheme for images
    Parihar B.
    Deshmukh M.
    Rawat A.S.
    Multimedia Tools and Applications, 2024, 83 (39) : 86757 - 86790
  • [48] CRT based threshold multi secret sharing scheme
    Subba Rao, Y.V.
    Bhagvati, Chakravarthy
    International Journal of Network Security, 2014, 16 (04) : 249 - 255
  • [49] Secret Image Sharing Scheme Based on Bivariate Polynomial
    Tang, Dan
    Huang, Jian
    2012 2ND INTERNATIONAL CONFERENCE ON UNCERTAINTY REASONING AND KNOWLEDGE ENGINEERING (URKE), 2012, : 193 - 195
  • [50] General secret sharing scheme
    Tan, KJ
    Zhu, HW
    COMPUTER COMMUNICATIONS, 1999, 22 (08) : 755 - 757