Abstract
Secret sharing scheme (SSS) is a well known method with applications in threshold cryptography, e-voting, e-bidding, sensor networks, cloud computing etc. A secret is shared among a set of shareholders or participants by a trusted dealer. Any authorized subset of participants can determine the secret. The set of all such subsets of participants is known as Access Structure. In a generalized access structure, any subset of participants can be an authorized subset. A novel ideal SSS based on MDS codes which realizes a strict generalized access structure is proposed. The proposed scheme has an advantage that the participants can choose their own shares and the trusted dealer can verify whether the shares are valid or not. A set of one-way functions are needed in this scheme. The one-way functions are based on hardness assumption of DLP which is an intractable problem. The proposed scheme is computationally perfect scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of National Computer Conference, vol. 48, pp. 313–317 (1979)
Reed, I.S., Solomon, G.: Polynomial codes over certain finite fields. J. SIAM 8(2), 300–304 (1960)
McEliece, R.J., Sarwate, D.V.: On sharing secrets and Reed-Solomon codes. Commun. Assoc. Comput. Mach. 24, 583–584 (1981)
Karnin, E.D., Greene, J.W., Hellman, M.E.: On secret sharing systems. IEEE Trans. Inf. Theory IT–29(1), 35–41 (1983)
Singleton, R.C.: Maximum distance q-nary codes. IEEE Trans. Inform. Theory IT–IO, 116–118 (1964)
McEliece, R.J.: The Theory of Information and Coding. Addison-Wesley, Reading (1977)
Ito, M., Saito, A., Nishizeki, T.: Secret sharing scheme realizing general access structure. Electron. Commun. Jpn. (Part III: Fundam. Electron. Sci.) 72(9), 56–64 (1989)
Benaloh, J.C., Leichter, J.: Generalized secret sharing and monotone functions. In: Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology - CRYPTO 1988, Santa Barbara, California, USA, 21–25 August 1988, pp. 27–35 (1988)
Brickell, E.F.: Some ideal secret sharing schemes. J. Comb. Math. Comb. Comput. 9, 105–113 (1989)
Stinson, D.R.: An explication of secret sharing schemes. Des. Codes Crypt. 2, 357–390 (1992)
Saha, T.: A generalized ideal secret sharing scheme. IACR Cryptology ePrint Archive 2016:929 (2016)
Beimel, A.: Secret-sharing schemes: a survey. In: Chee, Y., Guo, Z., Ling, S., Shao, F., Tang, Y., Wang, H., Xing, C. (eds.) Coding and Cryptology. Lecture Notes in Computer Science, vol. 6639, pp. 11–46. Springer, Heidelberg (2011)
Pattipati, D., Tentu, A., Venkaiah, V.: Ideal and computationally perfect secret sharing schemes for generalized access structures. In: Mauri, J., Thampi, S., Rawat, D., Jin, D. (eds.) Security in Computing and Communications. Communications in Computer and Information Science, vol. 467, pp. 149–161. Springer, Heidelberg (2014)
Vinod, V., Narayanan, A., Srinathan, K., Pandu Rangan, C., Kim, K.: On the power of computational secret sharing. In: Johansson, T., Maitra, S. (eds.) Indocrypt 2003. Lecture Notes in Computer Science, vol. 2904, pp. 162–176. Springer (2003)
Cachin. C: On-line secret sharing. In IMA: IMA Conference on Cryptography and Coding, LNCS lately (earlier: Cryptography and Coding II, Claredon Press, 1992) (1995)
Naidu, T.A., Paul, P., Venkaiah, V.Ch.: Ideal and perfect hierarchical secret sharing schemes based on MDS codes. In: Proceeding of International Conference on Applied and Computational Mathematics, Ankara, Turkey, pp. 256–272 (2012)
Naidu, A., Paul, T.P., Venkaiah, V.Ch.: Computationally perfect secret sharing schemes based on MDS codes. Int. J. Trust Manage. Comput. Commun. (IJTMCC) 2(4), 353–378 (2014)
Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. Inf. Theory 29(2), 208–210 (1983)
Liu, J., Mesnager, S., Chen, L.: Secret sharing schemes with general access structures. In: International Conference on Information Security and Cryptology, pp. 341–360 (2016)
Acknowledgements
I would like to thank Digital India Corporation and Ministry of Electronics and Information Technology(MeitY), Govt of India for supporting this work under Visvesvaraya Ph.D. Scheme for Electronics and IT.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Nallabothu, S., Rukmarekha, N., Subbarao, Y.V. (2020). Generalized Secret Sharing Scheme Based on MDS Codes. In: Gunjan, V., Garcia Diaz, V., Cardona, M., Solanki, V., Sunitha, K. (eds) ICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management. ICICCT 2019. Springer, Singapore. https://doi.org/10.1007/978-981-13-8461-5_41
Download citation
DOI: https://doi.org/10.1007/978-981-13-8461-5_41
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-8460-8
Online ISBN: 978-981-13-8461-5
eBook Packages: EngineeringEngineering (R0)