A. F. Chernyavsky, A. Kolyada, A. Martinov, S. Y. Protasenya
{"title":"带掩蔽变换的模块化秘密共享阈值方法的正确性问题","authors":"A. F. Chernyavsky, A. Kolyada, A. Martinov, S. Y. Protasenya","doi":"10.29235/1561-8323-2019-63-6-662-671","DOIUrl":null,"url":null,"abstract":"The article formulates the principles of constructing threshold cryptographic schemes for secret sharing based on a modular coding and a linear masking function with an additive variational component of pseudo-random type. The main attention is paid to the correctness problem of schemes of the considered class within the limits of the accepted model. The congruent condition in the module of the secret-original ring of the masking function values in full and partial modular number systems is obtained. On the basis of the above-said, the method of correct implementation of the threshold principle of secret information sharing is developed. The proposed approach to solving the problem under study is demonstrated by specific numerical examples.","PeriodicalId":11227,"journal":{"name":"Doklady Akademii nauk","volume":"52 1","pages":"662-671"},"PeriodicalIF":0.0000,"publicationDate":"2020-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Correctness problem of the threshold method of modular sharing of secrets with masking transformation\",\"authors\":\"A. F. Chernyavsky, A. Kolyada, A. Martinov, S. Y. Protasenya\",\"doi\":\"10.29235/1561-8323-2019-63-6-662-671\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article formulates the principles of constructing threshold cryptographic schemes for secret sharing based on a modular coding and a linear masking function with an additive variational component of pseudo-random type. The main attention is paid to the correctness problem of schemes of the considered class within the limits of the accepted model. The congruent condition in the module of the secret-original ring of the masking function values in full and partial modular number systems is obtained. On the basis of the above-said, the method of correct implementation of the threshold principle of secret information sharing is developed. The proposed approach to solving the problem under study is demonstrated by specific numerical examples.\",\"PeriodicalId\":11227,\"journal\":{\"name\":\"Doklady Akademii nauk\",\"volume\":\"52 1\",\"pages\":\"662-671\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-01-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Doklady Akademii nauk\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.29235/1561-8323-2019-63-6-662-671\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Doklady Akademii nauk","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.29235/1561-8323-2019-63-6-662-671","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Correctness problem of the threshold method of modular sharing of secrets with masking transformation
The article formulates the principles of constructing threshold cryptographic schemes for secret sharing based on a modular coding and a linear masking function with an additive variational component of pseudo-random type. The main attention is paid to the correctness problem of schemes of the considered class within the limits of the accepted model. The congruent condition in the module of the secret-original ring of the masking function values in full and partial modular number systems is obtained. On the basis of the above-said, the method of correct implementation of the threshold principle of secret information sharing is developed. The proposed approach to solving the problem under study is demonstrated by specific numerical examples.