Multipartite Secret Sharing by Bivariate Interpolation

被引:0
|
作者
Tamir Tassa
Nira Dyn
机构
[1] The Open University,Division of Computer Science
[2] Tel Aviv University,Department of Applied Mathematics
来源
Journal of Cryptology | 2009年 / 22卷
关键词
Secret sharing; Multipartite access structures; Compartmented access structures; Hierarchical threshold access structures; Bivariate interpolation; Monotone span programs;
D O I
暂无
中图分类号
学科分类号
摘要
Given a set of participants that is partitioned into distinct compartments, a multipartite access structure is an access structure that does not distinguish between participants belonging to the same compartment. We examine here three types of such access structures: two that were studied before, compartmented access structures and hierarchical threshold access structures, and a new type of compartmented access structures that we present herein. We design ideal perfect secret sharing schemes for these types of access structures that are based on bivariate interpolation. The secret sharing schemes for the two types of compartmented access structures are based on bivariate Lagrange interpolation with data on parallel lines. The secret sharing scheme for the hierarchical threshold access structures is based on bivariate Lagrange interpolation with data on lines in general position. The main novelty of this paper is the introduction of bivariate Lagrange interpolation and its potential power in designing schemes for multipartite settings, as different compartments may be associated with different lines or curves in the plane. In particular, we show that the introduction of a second dimension may create the same hierarchical effect as polynomial derivatives and Birkhoff interpolation were shown to do in Tassa (J. Cryptol. 20:237–264, 2007).
引用
收藏
页码:227 / 258
页数:31
相关论文
共 50 条
  • [31] Cheating identifiable secret sharing scheme using symmetric bivariate polynomial
    Liu, Yanxiao
    Yang, Chingnung
    Wang, Yichuan
    Zhu, Lei
    Ji, Wenjiang
    INFORMATION SCIENCES, 2018, 453 : 21 - 29
  • [32] Changing the Threshold in a Bivariate Polynomial Based Secret Image Sharing Scheme
    Sun, Qindong
    Cao, Han
    Li, Shancang
    Song, Houbing
    Liu, Yanxiao
    MATHEMATICS, 2022, 10 (05)
  • [33] Ideal social secret sharing using Birkhoff interpolation method
    Eslami, Ziba
    Pakniat, Nasrollah
    Nojoumian, Mehrdad
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 4973 - 4982
  • [34] Protected Fair Secret Sharing Based Bivariate Asymmetric Polynomials in Satellite Network
    Han, Yanyan
    Yu, Jiangping
    Hu, Guangyu
    Pan, Chenglei
    Xie, Dingbang
    Guo, Chao
    Waheed, Abdul
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (03): : 4789 - 4802
  • [35] Protecting user privacy for cloud computing by bivariate polynomial based secret sharing
    Yang, Ching-Nung
    Lai, Jia-Bin
    Fu, Zhangjie
    Journal of Computing and Information Technology, 2015, 23 (04) : 341 - 355
  • [36] (t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial
    Harn, Lein
    Hsu, Ching-Fang
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (02) : 1495 - 1504
  • [37] (t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial
    Lein Harn
    Ching-Fang Hsu
    Wireless Personal Communications, 2017, 95 : 1495 - 1504
  • [38] Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation
    Yuan, Lifeng
    Li, Mingchu
    Guo, Cheng
    Choo, Kim-Kwang Raymond
    Ren, Yizhi
    PLOS ONE, 2016, 11 (10):
  • [39] Space-Efficient Verifiable Secret Sharing Using Polynomial Interpolation
    Cafaro, Massimo
    Pelle, Piergiuseppe
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (02) : 453 - 463
  • [40] Threshold changeable secret image sharing scheme based on interpolation polynomial
    Yan-Xiao Liu
    Ching-Nung Yang
    Chi-Ming Wu
    Qin-Dong Sun
    Wei Bi
    Multimedia Tools and Applications, 2019, 78 : 18653 - 18667