Abstract
Secret sharing scheme plays a crucial role in distributed cryptosystems. Due to its extensive use in numerous applications, an important goal in this area is to minimize trust among the participants. To remove this bottleneck, robust secret sharing, which allows the correct secret to be recovered even when some of the shares presented during an attempted reconstruction are incorrect, can be an efficient tool. However, as unconditional security demands honest majority and share size to be at least equal to the size of the secret, the need for computational security of such schemes has been felt over the years, specially in case of multi-secret sharing schemes. In this paper, we provide a notion of computationally robust multi-secret sharing scheme for general access structure. We also propose a robust multi-secret sharing scheme for general access structure and prove its computational security under the proposed notation.
Research supported in part by National Board for Higher Mathematics, Department of Atomic Energy, Government of India (No 2/48(10)/2013/NBHM(R.P.)/R&D II/695).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bellare, M., Rogaway, P.: Robust computational secret sharing and a unified account of classical secret-sharing goals. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 172–184 (2007)
Blakley, G.R.: Safeguarding cryptographic keys. In: The National Computer Conference 1979 AFIPS, vol. 48, pp. 313–317 (1979)
Chang, T.Y., Hwang, M.S., Yang, W.P.: An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme. Appl. Math. Comput. 163, 169–178 (2005)
Damgard, I., Jakobsen, T.P., Nielsen, J.B., Pagter, J.I.: Secure key management in the cloud. In: Cryptography and Coding, pp. 270–289. Springer, Heidelberg (2013)
Das, A., Adhikari, A.: An efficient multi-use multi-secret sharing scheme based on hash function. Appl. Math. Lett. 23(9), 993–996 (2010)
Dehkordi, M.H., Mashhadi, S.: An efficient threshold verifiable multi-secret sharing. Comp. Stand. Inter. 30, 187–190 (2008)
Geng, Y.J., Fan, X.H., Hong, F.: A new multi-secret sharing scheme with multi-policy. In: The 9th International Conference on Advanced Communication Technology, Vol. 3, pp. 1515–1517 (2007)
He, J., Dawson, E.: Multisecret-sharing scheme based on one-way function. Electron. Lett. 31(2), 93–95 (1994)
He, J., Dawson, E.: Multi-stage secret sharing based on one-way function. Electron. Lett. 30(19), 1591–1592 (1994)
Herranz, J., Ruiz, A., Saez, G.: New results and applications for multi-secret sharing schemes. In: Design, Codes and Cryptography, pp. 1–24, Springer, Heidelberg (2013)
Herranz, J., Ruiz, A., Saez, G.: Sharing many secrets with computational provable security. Inf. Process. Lett. 113, 572–579 (2013)
Krawczyk, H.: Distributed ngerprints and secure information dispersal. In: 12th Annual ACM Symposium on Principles of Distributed Computing (PODC 1993), ACM Press, Austria, pp. 207–218 (1993)
Martin, K.M.: Challenging the adversary model in secret sharing schemes. In: Coding and Cryptography II, Proceedings of the Royal Flemish Academy of Belgium for Science and the Arts, pp. 45–63 (2008)
McEliece, R., Sarwate, D.: On sharing secrets and reed-solomon codes. Commun. ACM 24(9), 583–584 (1981)
Pang, L.J., Li, H., Wang, Y.: An efficient and secure multi-secret sharing scheme scheme with general access structure. J. Wuhan Univ. Natur. Sci. 11(6) (2006)
Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority (extended abstract). STOC 1989, 73–85 (1989)
Roy, P.S., Adhikari, A.: Multi-use multi-secret sharing scheme for general access structure. Annals of the University of Craiova, Math. Comput. Sci. Ser. 37(4), 50–57 (2010)
Roy, P.S., Adhikari, A., Xu, R., Kirill, M., Sakurai, K.: An efficient robust secret sharing scheme with optimal cheater resiliency. SPACE. LNCS 8804, 47–58 (2014)
Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)
Shao, J.: Efficient verifiable multi-secret sharing scheme based on hash function. Inf. Sci. 278, 104–109 (2014)
Wei, Y., Zhong, P., Xiong, G.: A Multi-stage secret sharing scheme with general access structures. In: Wireless Communications, Networking and Mobile Computing, Beijing, pp. 1–4 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Das, A., Roy, P.S., Adhikari, A. (2015). Computationally Secure Robust Multi-secret Sharing for General Access Structure. In: Mohapatra, R., Chowdhury, D., Giri, D. (eds) Mathematics and Computing. Springer Proceedings in Mathematics & Statistics, vol 139. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2452-5_9
Download citation
DOI: https://doi.org/10.1007/978-81-322-2452-5_9
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2451-8
Online ISBN: 978-81-322-2452-5
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)