Open Access Open Access  Restricted Access Subscription or Fee Access

Multi-Stage Secret Sharing Schemes Based on Asmuth’s Bloom Sequence

Appala Naidu Tentu, V. Kamakshi Prasad, V. Ch. Venkaiah

Abstract


We have proposed secret sharing scheme that uses the Mignotte's sequence proposed in our previous paper in [15]. Another secret sharing scheme that uses the Asmuth-Bloom’s sequence are proposed in this paper.  The proposed secret sharing scheme is based on the Chinese Remainder Theorem (CRT). Novelty of the proposed scheme is that the shares of the participants are reusable that means even for the every new secret the shares are same. Also only one share needs to be kept by each participant even for the multi-secret sharing scheme. Further, the scheme is verifiable means that verifying the honesty of the participants in the reconstruction phase. Correctness and complexity is discussed at the end.

Keywords


Multi-Stage, CRT, Mignotte's Sequence, Asmuth-Bloom Sequence, Secret Sharing Scheme

Full Text:

PDF

References


G.R. Blakly, Safeguarding cryptographic keys, AFIPS, Vol. 48 (1979), pp. 313-317.

Shamir, A. 1979. How to share a secret. Comm.ACM 22, 612-613.

Ting - Yi Chang,Min-Shiang Hwang, Wei-Pang Yang A new multi-stage secret sharing scheme using one-wayfunction. ACM SIGOPS Operating Systems Volume 39 Issue 1, Pages 48 - 55, January 2005.

Hui - Xian Li,Chun-Tian Cheng, and Liao-Jun Pang An Improved Multi-stage (t, n)-Threshold Secret Sharing Scheme. WAIM 2005, LNCS 3739, pp. 267 ˆaA¸S 274, 2005. Al’ Springer-Verlag Berlin Heidelberg 2005. ˆ

Jackson Wen-Ai, Martin, Keith, M., O’Keefe, Christine M.: On Sharing Many Secrets. In:Pieprzyk,J., Safavi-Naini, R. (eds.), Asiacrypt’94. Lecture Notes in Computer Science,Vol. 917. Springer-Verlag, Berlin Heidelberg New York (1995) 42 54.

Ting - Yi Chang, Chou-Chen Yang, and Min-Shiang Hwang. Threshold untraceable signature for group communication. IEEE Proceedings-Communications, accepted (July 26, 2003) and to appear.

Ting - Yi Chang, Chou-Chen Yang, and Min-Shian Hwang. Threshold signature for group communications without shared distribution center. Future Generation Computer Systems, accepted (June 20, 2003) and to appear.

Min-Shiang Hwang, Cheng-Chi Lee, and Ting-Yi Chang. Broadcasting cryptosystem in computer network usinggeometric properties of lines. Journal of Information Science and Engineering,18(3):373-378, 2002.

J. He, E. Dawson, Multisecret-sharing scheme based on one-way function, Electronics Letters 31 (2) (1995) 93-95.

J. He, E. Dawson, Multisecret-sharing scheme based on one-way function, Electronics Letters 31 (2)(1995) 93-95.

L. Harn, Comment: Multistage secret sharing based on one-way function, Electronics Letters 31 (4) (1995) 262.

Xukai Zou,Fabio Maino,Elisa Bertino,Yan Sui,Kai Wang,Feng Li.A New Approach to Weighted Multi-Secret Sharing.10.1109/ICCCN.(2011).

M. Mignotte. How to share a secret. In T. Beth, editor,Cryptography-Proceedings of the Work-shop on Cryptography, Burg Feuerstein, 1982, volume 149 of Lecture Notes in Computer Science,pp. 371-375. Springer-Verlag, 1983.

Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Transactions on Information Theory IT-29(2),pp. 208-210 (1983).

O. Bidya Chanu, Appala Naidu T, V.Ch.Venkaiah, Multi-Stage Multi-Secret Sharing Schemes Based on Chinese Remainder Theorem,. ICARCSET '15 Proceedings of the 2015 International Conference on Advanced Research in Computer Science Engineering & Technology (ICARCSET 2015), Article No. 17, ISBN: 978-1-4503-3441-9

Anjaneyulu Endurthi, Oinam B Chanu, Appala Naidu Tentu and V. Ch. Venkaiah. Reusable Multi-Stage Multi-Secret Sharing Schemes based on CRT., Journal of Communications Software and Systems (JCOMSS) ,Vol. 11, No. 1, pp. 15-24, March 2015.

Anjaneyulu Endurthi, Appala Naidu Tentu and Ch. V Venkaiah. Article: Reusable Multi-Stage Multi-Secret Sharing Scheme based on Asmuth-Bloom Sequence. IJCA Proceedings on International Conference on Communication, Computing and Information Technology ICCCMIT 2014(3):1-6, March 2015, ISBN:973-93-80885-90-2.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.