{"title":"一种新颖的支持共享优先级的线性有界秘密共享方案","authors":"Subhajyoti Barman, Hiran Nandy, S. Biswas","doi":"10.1109/ICCECE.2016.8009547","DOIUrl":null,"url":null,"abstract":"Secret Sharing is a technique of decomposing a secret into number of shares in such a manner that reconstruction of the secret is only possible by a subset of shares that has at least a specific minimum size. Adi Shamir and George Blackley individually proposed the idea of Secret Sharing for the first time, but high computational complexity and noise like shares are the main issues of these schemes. However, using current state of the art schemes it is possible to perform this task in linear time without producing noise like shares. Providing special privilege to a subset of shares is not supported by the existing schemes. It would be a novel concept if it is possible to assign special priority to a set of shares during decomposition of secrets. Hence a linear time bounded scheme is being proposed which decomposes any secret into N number of shares among which M (M≤N) of them are specially privileged. During reconstruction of the actual secret, a subset of shares with a minimum size K (M≤K≤N) which essentially contains all the specially privileged shares or mandatory shares is required.","PeriodicalId":414303,"journal":{"name":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A novel linearly bounded secret sharing scheme that supports prioritization of shares\",\"authors\":\"Subhajyoti Barman, Hiran Nandy, S. Biswas\",\"doi\":\"10.1109/ICCECE.2016.8009547\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Secret Sharing is a technique of decomposing a secret into number of shares in such a manner that reconstruction of the secret is only possible by a subset of shares that has at least a specific minimum size. Adi Shamir and George Blackley individually proposed the idea of Secret Sharing for the first time, but high computational complexity and noise like shares are the main issues of these schemes. However, using current state of the art schemes it is possible to perform this task in linear time without producing noise like shares. Providing special privilege to a subset of shares is not supported by the existing schemes. It would be a novel concept if it is possible to assign special priority to a set of shares during decomposition of secrets. Hence a linear time bounded scheme is being proposed which decomposes any secret into N number of shares among which M (M≤N) of them are specially privileged. During reconstruction of the actual secret, a subset of shares with a minimum size K (M≤K≤N) which essentially contains all the specially privileged shares or mandatory shares is required.\",\"PeriodicalId\":414303,\"journal\":{\"name\":\"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCECE.2016.8009547\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCECE.2016.8009547","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A novel linearly bounded secret sharing scheme that supports prioritization of shares
Secret Sharing is a technique of decomposing a secret into number of shares in such a manner that reconstruction of the secret is only possible by a subset of shares that has at least a specific minimum size. Adi Shamir and George Blackley individually proposed the idea of Secret Sharing for the first time, but high computational complexity and noise like shares are the main issues of these schemes. However, using current state of the art schemes it is possible to perform this task in linear time without producing noise like shares. Providing special privilege to a subset of shares is not supported by the existing schemes. It would be a novel concept if it is possible to assign special priority to a set of shares during decomposition of secrets. Hence a linear time bounded scheme is being proposed which decomposes any secret into N number of shares among which M (M≤N) of them are specially privileged. During reconstruction of the actual secret, a subset of shares with a minimum size K (M≤K≤N) which essentially contains all the specially privileged shares or mandatory shares is required.