scispace - formally typeset
Journal ArticleDOI

A label graph based verifiable secret sharing scheme for general access structures

Reads0
Chats0
TLDR
A verifiable secret sharing scheme realizing general access structures is proposed that can resist possible internal attack performed by malicious participants, who want to obtain additional shares or provide a fake share to other participants.
Abstract
Secret sharing is that a dealer distributes a piece of information (called a share) about a secret to each participant such that authorized subsets of participants can reconstruct the secret but unauthorized subsets of participants cannot determine the secret. In this paper, an access structure can be represented by a label graph G, where a vertex denotes a participant and a complete subgraph of G corresponds to a minimal authorized subset. The vertices of G are labeled into distinct vectors uniquely determined by the maximum prohibited structure. Based on such a label graph, a verifiable secret sharing scheme realizing general access structures is proposed. A major advantage of this scheme is that it applies to any access structure, rather than only structures rep-resentable as previous graphs, i.e., the access structures of rank two. Furthermore, verifiability of the proposed scheme can resist possible internal attack performed by malicious participants, who want to obtain additional shares or provide a fake share to other participants.

read more

Citations
More filters

Security of Patient’s Privacy in E-Health using Secret Sharing and Homomorphism Encryption Scheme

TL;DR: This paper combines the property of homomorphism encryption and secret sharing to encrypt HRs so that complex computations of Lagrange are outsourced to the cloud service provider with the flexibility of adding and removing shareholders.

Framework and Solution for Assigning Shares to Communication Network Domains under Secret Sharing Scheme

TL;DR: A mathematical model of secret sharing among different network domains is formulated and an evaluation measure of security strength together with its evaluation algorithm is proposed.
Journal ArticleDOI

General Access Structure Secret Sharing in Matrix Projection

TL;DR: General access structure image secret sharing based on matrix projection shows high accuracy, high security and less overhead in the network due to highly reduced size of image shares.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI

Prediction and entropy of printed English

TL;DR: A new method of estimating the entropy and redundancy of a language is described, which exploits the knowledge of the language statistics possessed by those who speak the language, and depends on experimental results in prediction of the next letter when the preceding text is known.

Safeguarding cryptographic keys

TL;DR: Certain cryptographic keys, such as a number which makes it possible to compute the secret decoding exponent in an RSA public key cryptosSystem,1,5 or the system master key and certain other keys in a DES cryptosystem,3 are so important that they present a dilemma.
Journal ArticleDOI

An explication of secret sharing schemes

TL;DR: This paper presents numerous direct constructions for secret sharing schemes, such as the Shamir threshold scheme, the Boolean circuit construction of Benaloh and Leichter, the vector space construction of Brickell, and the Simmons geometric construction, emphasizing combinatorial construction methods.
Journal ArticleDOI

On the classification of ideal secret sharing schemes

TL;DR: In this article, the authors show a relationship between ideal secret sharing schemes and matroids, and show that the set of possible shares in a secret sharing scheme is matroid-like.
Related Papers (5)