Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2897795.2897810acmotherconferencesArticle/Chapter ViewAbstractPublication PagescisrcConference Proceedingsconference-collections
research-article

Efficient Algorithm to Construct Perfect Secret Sharing Scheme for a Given Access Structure

Published: 05 April 2016 Publication History

Abstract

The threshold scheme, the monotone circuit construction, and the vector space construction are some of the well-known secret sharing schemes in cryptography. The threshold and monotone circuit secret sharing schemes are fairly easy to construct for any given access structure Γ. The construction of a secret sharing scheme realizing a given access structure Γ with Vector Space Construction requires the existence of a function φ from a set of participants into a vector space, that is, φ: P → (Zp)d. This function φ must satisfy certain conditions in order to recover the secret key. There is no known algorithm to construct such a function φ in general. Constructions are mainly done by trial and error. In this paper, we develop polynomial algorithm to construct such φ function(s) for given access structures. Using the φ function, we also give an algorithm to construct secret sharing scheme for the access structures.

References

[1]
M. Atici, Secret Sharing Scheme: Vector Space Secret Sharing Scheme and &phis; Function, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, August 26--29, Istanbul-Turkey.
[2]
M. Atici,Vector Space Secret Sharing and an Efficient Algorithm to Construct a &phis; Function, ACMSE'13, April 4--6, 2013, Savannah, GA, USA.
[3]
J. Benaloh and J. Leichter, Generalized secret sharing and monotone functions, Lecture notes in Computer Science, 403(1990), pp. 27--35.
[4]
G. R. Blakley, Safegarding crytographic keys, Federal information Processing Standard Conference Proceedings, 48(1979), pp. 313--317.
[5]
E. F. Brickell(Ed), Advances in Cryptology-CRYPTO'92 Proceedings, Lecture Notes in Computer Science, vol. 740, Springer, 1993.
[6]
M. Ito, A. Saito, and T. Hishizeki, Secret sharing scheme realizing general access structure, Proceedings IEEE Globecom '87(1987), pp. 99--102.
[7]
A. Shamir, How to share a secret, Communication of the ACM,22(1979), pp. 612--613.
[8]
D. R. Stinson, Crtptography Theory and Practice, Chapman and Hall/CRC, 2006.
  1. Efficient Algorithm to Construct Perfect Secret Sharing Scheme for a Given Access Structure

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CISRC '16: Proceedings of the 11th Annual Cyber and Information Security Research Conference
    April 2016
    150 pages
    ISBN:9781450337526
    DOI:10.1145/2897795
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Oak Ridge National Laboratory

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 05 April 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Secret sharing scheme
    2. access structures
    3. monotone secret sharing
    4. threshold scheme
    5. vector space secret sharing

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    CISRC '16

    Acceptance Rates

    CISRC '16 Paper Acceptance Rate 11 of 28 submissions, 39%;
    Overall Acceptance Rate 69 of 136 submissions, 51%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 104
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 03 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media