Abstract
Secret sharing has numerous applications in cryptography field and distributed computing. Threshold secret allotment scheme has been well considered a lot for the last three decades and proposed many such efficient schemes. The main objective of allotment sharing scheme is to deliver the secret to some parties so that only desirable subsets of the parties can get back the secrets whereas secret cannot be leaked by other parties. Nowadays, an ideal scheme shares multiple secrets with perfect security is of high demand. In this paper, we have designed a multi-secret sharing scheme on the basis of geometry in Galois field. The scheme is ideal, perfect without information leakage.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Blakley, G.R.: Safeguarding cryptographic keys. Proc. AFIPS 48, 313–317 (1979)
Blakley, G.R., Meadows, C.: Security of ramp schemes. In: Proceedings of CRYPTO ’84, LNCS 196, Springer, pp. 242–269 (1985)
Mignotte, M.: How to share a secret. In: Proceedings of the Conference on Cryptography, pp. 371–375 (1982)
Harn, L.: Efficient sharing (broadcasting) of multiple secrets. IEE Proc. Comput. Digital Techniq. 142(3), 237–240 (1995)
Hwang, R.J., Chang, C.C.: An on-line secret sharing scheme for multi secrets. J. Comput. Commun. 21(13), 1170–1176 (1998)
Chien, H.Y., Jan, J.K., Tseng, Y.M.: A practical (t, n) multi-secret sharing scheme. In: IEICE Transformation of Fundamentals of Electronics, Communications and Computer, pp. 2762–2765 (2000)
Yang, C.C., Chang, T.Y., Hwang, M.S.: A (t, n) multi-secret sharing scheme. J. Appl. Math. Comput. 151(2), 483–490 (2004)
Hwang, R.J., Lee, W.B., Chang, C.C.: A concept of designing cheater identification methods for secret sharing. J. Syst. Softw. 46(1), 7–11 (1999)
Pang, L.J., Wang, Y.M.: A new (t, n) multi-secret sharing scheme based on Shamir’s secret sharing. J. Appl. Math. Comput. 167(2), 840–848 (2005)
Bai, L.: A Strong Ramp Secret Sharing Scheme Using Matrix Projection, Presented at the Second International Workshop on Trust. Security and Privacy for Ubiquitous Computing, Niagara-Falls, Buffalo, NY (2006)
Tang, C., Yao, Z.: A New (t, n)-threshold secret sharing scheme. In: International Conference on Advanced Computer Theory and Engineering, IEEE pp. 920–924 (2008)
Shi, R., Zhong, H.: A secret sharing scheme with the changeable threshold value. In: International Symposium on Information Engineering and Electronic Commerce, IEEE 2009 pp. 233–236
Chou,Y., Chih, H.L., Pao, C.L., Li, Y.C.: A (2, 3) threshold secret sharing scheme using Sudoku. In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE (2010)
Harn, L., Lin, C.: Strong (n, t, n) verifiable secret sharing scheme. J. Inform. Sci. 180(16), 3059–3064 (2010)
Liu, Y.X., Harn, L., Yang, C.N., Zhang, Y.Q.: Efficient (n, t, n) secret sharing schemes. J. Syst. Softw. 85(6), 1325–1332 (2012)
Patil, S., Desmukh, P.: A novel (t, n) threshold secret sharing using dot product of linearly independent vectors. Int. J. Adv. Res. Comput. Commun. Eng. 2(7) (2013)
Guo, C., Chang, C.C.: A construction for secret sharing scheme with general access structure. J. Informat. Hiding Multimed. Signal Proc. 4(1) (2013)
Tassa, T.: Hierarchical threshold secret sharing. J. Cryptol. 20(2), 237–264 (2007)
Zhao, D., Peng, H., Wang, C., Yang, Y.: A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure. J. Comput. Math. Appl. 64, 611–615 (2012)
Su, J., Juan, T., Chuang Y.L., Li, M.J.: An online verifiable and detectable (t, n) multi-secret sharing scheme based on HS-TS. In: Proceedings of Fourth International Conference in Information Technology and Applications (ICITA2007), Harbin, China, EI , vol. I, pp. 56–59 January 15–18, 2007
Hsu, C., Cheng, Q., Tang, X., Zeng, B.: An ideal multi-secret sharing scheme based on MSP. J. Inf. Sci. 181(7), 1403–1409 (2011)
Subba Rao, Y.V., Chakravarthy, B.: CRT based threshold multi secret sharing scheme. Int. J. Netw. Security, 16(4), 249–255 (2014)
Yuan, L., Li, M., Guo, C., Choo, K.R., Ren,Y.: Novel threshold changeable secret sharing schemes based on polynomial interpolation. PLoS One 11(10), e0165512 (2016). https://doi.org/10.1371/journal.pone.0165512
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Duari, B., Giri, D. (2019). An Ideal and Perfect (t, n) Multi-secret Sharing Scheme Based on Finite Geometry. In: Chandra, P., Giri, D., Li, F., Kar, S., Jana, D. (eds) Information Technology and Applied Mathematics. Advances in Intelligent Systems and Computing, vol 699. Springer, Singapore. https://doi.org/10.1007/978-981-10-7590-2_6
Download citation
DOI: https://doi.org/10.1007/978-981-10-7590-2_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7589-6
Online ISBN: 978-981-10-7590-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)