Multiparty secret sharing based on hidden multipliers

08/16/2021
by   Vitaly Roman'kov, et al.
0

Secret sharing schemes based on the idea of hidden multipliers in encryption are proposed. As a platform, one can use both multiplicative groups of finite fields and groups of invertible elements of commutative rings, in particular, multiplicative groups of residue rings. We propose two versions of the secret sharing scheme and a version of (k,n)-thrested scheme. For a given n, the dealer can choose any k. The main feature of the proposed schemes is that the shares of secrets are distributed once and can be used multiple times. This property distinguishes the proposed schemes from the secret sharing schemes known in the literature. The proposed schemes are semantically secure. The same message can be transmitted in different forms. From the transferred secret c it is impossible to determine which of the two given secrets m_1 or m_2 was transferred. For concreteness, we give some numerical examples.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/13/2022

Multi-recipient and threshold encryption based on hidden multipliers

In this paper, a scheme is proposed that allow the dealer to encrypt mes...
research
04/13/2021

On Mignotte Secret Sharing Schemes over Gaussian Integers

Secret Sharing Schemes (SSS) are methods for distributing a secret among...
research
02/06/2023

Secret sharing scheme based on hashing

We propose an adaptive threshold multi secret sharing scheme based solel...
research
05/21/2022

A New Metric and Its Scheme Construction for Evolving 2-Threshold Secret Sharing Schemes

Evolving secret sharing schemes do not require prior knowledge of the nu...
research
04/25/2019

Message Randomization and Strong Security in Quantum Stabilizer-Based Secret Sharing for Classical Secrets

We improve the flexibility in designing access structures of quantum sta...
research
03/27/2020

An ideal hierarchical secret sharing scheme

One of the methods used in order to protect a secret K is a secret shari...
research
02/18/2022

Post-quantum Multi-stage Secret Sharing Schemes using Inhomogeneous Linear Recursion and Ajtai's Function

Secret sharing was firstly proposed in 1979 by Shamir and Blakley respec...

Please sign up or login with your details

Forgot password? Click here to reset