{"title":"A Fast (2, 2^m)-Threshold Secret Sharing Scheme Using m Linearly Independent Binary Vectors","authors":"Yuji Suga","doi":"10.1109/NBiS.2013.90","DOIUrl":null,"url":null,"abstract":"Fast (k, n)-threshold secret sharing schemes with exclusive-OR operations have proposed by Kurihara et al. and Fujii et al. independently. Their method are ideal that share size is equal to the size of the data to be distributed with the benefits that can be handled very fast for using only XOR operation at distribution and restoration processes. In these cases for the number of shares n, target data must be equally divided into individual np-1 pieces where np is a prime more than n.The existing methods described above are configured using the cyclic matrices with prime order. On the other hand, a new method in WAIS2013 have proposed, this leads to general constructions of (2, p + 1)-threshold secret sharing schemes.In this paper, we use m-dimensional vector spaces over Z2 on having bases that meet certain conditions in order to construct proposed methods. This paper defines a new notion \"2-propagation bases set\" as a bases set to be used in the configuration. In order to guarantee the existence of (2; 2m)- threshold secret sharing schemes, we also treat the presence of the m-dimensional bases.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"79 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 16th International Conference on Network-Based Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NBiS.2013.90","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Fast (k, n)-threshold secret sharing schemes with exclusive-OR operations have proposed by Kurihara et al. and Fujii et al. independently. Their method are ideal that share size is equal to the size of the data to be distributed with the benefits that can be handled very fast for using only XOR operation at distribution and restoration processes. In these cases for the number of shares n, target data must be equally divided into individual np-1 pieces where np is a prime more than n.The existing methods described above are configured using the cyclic matrices with prime order. On the other hand, a new method in WAIS2013 have proposed, this leads to general constructions of (2, p + 1)-threshold secret sharing schemes.In this paper, we use m-dimensional vector spaces over Z2 on having bases that meet certain conditions in order to construct proposed methods. This paper defines a new notion "2-propagation bases set" as a bases set to be used in the configuration. In order to guarantee the existence of (2; 2m)- threshold secret sharing schemes, we also treat the presence of the m-dimensional bases.
Kurihara et al.和Fujii et al.分别提出了具有异或操作的快速(k, n)阈值秘密共享方案。他们的方法是理想的,共享大小等于要分发的数据的大小,其优点是在分发和恢复过程中只使用异或操作可以非常快速地处理。在这些情况下,对于共享的数量n,目标数据必须平均地分成单独的np-1块,其中np是大于n的素数。上述现有方法使用素数阶的循环矩阵进行配置。另一方面,在WAIS2013中提出了一种新的方法,这导致了(2,p + 1)-阈值秘密共享方案的一般构造。在本文中,我们利用Z2上的m维向量空间,在满足一定条件的基上构造所提出的方法。本文定义了一个新的概念“2-传播基集”作为组态中使用的基集。为了保证(2)的存在;2m)-阈值秘密共享方案,我们也处理m维基的存在。