({1,3},n) Hierarchical Secret Sharing Scheme Based on XOR Operations for a Small Number of Indispensable Participants

Koji Shima, H. Doi
{"title":"({1,3},n) Hierarchical Secret Sharing Scheme Based on XOR Operations for a Small Number of Indispensable Participants","authors":"Koji Shima, H. Doi","doi":"10.1109/AsiaJCIS.2016.11","DOIUrl":null,"url":null,"abstract":"Blakley and Shamir independently introduce the basic idea of a (k, n) threshold secret sharing scheme in 1979. Shamir also recognize the concept of a hierarchical scheme, and suggests accomplishing the scheme by giving the participants of the more capable levels a greater number of shares. Some of hierarchical secret sharing schemes are known in the way that the secret is shared among a group of participants that is partitioned into levels. We look at hierarchical secret sharing schemes in the purpose of the ease of deleting the secret after it is distributed, that is, the reliability of data deletion depends on the deletion of the shares of the indispensable participants, and focus on providing a fast method and practicality. In this paper, we introduce Fujii et al.'s XOR-based secret sharing scheme and Kurihara et al.'s XOR-based secret sharing scheme, and propose a perfect and ideal ({1,3},n) hierarchical secret sharing scheme based on Fujii et al.'s XOR-based secret sharing scheme for a small number of indispensable participants to place practicality. Our implementation system on a PC with Intel Celeron G1820 2.70GHz and 3.6GB RAM can recover the secret in the processing of around 7.0Gbps.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsiaJCIS.2016.11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

Blakley and Shamir independently introduce the basic idea of a (k, n) threshold secret sharing scheme in 1979. Shamir also recognize the concept of a hierarchical scheme, and suggests accomplishing the scheme by giving the participants of the more capable levels a greater number of shares. Some of hierarchical secret sharing schemes are known in the way that the secret is shared among a group of participants that is partitioned into levels. We look at hierarchical secret sharing schemes in the purpose of the ease of deleting the secret after it is distributed, that is, the reliability of data deletion depends on the deletion of the shares of the indispensable participants, and focus on providing a fast method and practicality. In this paper, we introduce Fujii et al.'s XOR-based secret sharing scheme and Kurihara et al.'s XOR-based secret sharing scheme, and propose a perfect and ideal ({1,3},n) hierarchical secret sharing scheme based on Fujii et al.'s XOR-based secret sharing scheme for a small number of indispensable participants to place practicality. Our implementation system on a PC with Intel Celeron G1820 2.70GHz and 3.6GB RAM can recover the secret in the processing of around 7.0Gbps.
({1,3},n)一种基于少量不可或缺参与者异或操作的分层秘密共享方案
1979年,Blakley和Shamir分别提出了(k, n)阈值秘密共享方案的基本思想。Shamir还认识到分层方案的概念,并建议通过给予更有能力的级别的参与者更多的股份来完成该方案。一些分层的秘密共享方案是在被划分为不同级别的一组参与者之间共享秘密的。我们着眼于分层的秘密共享方案,目的在于在秘密被分发后是否容易被删除,即数据删除的可靠性取决于不可缺少的参与者的份额是否被删除,并侧重于提供一种快速的方法和实用性。本文介绍了Fujii等人基于xor的秘密共享方案和Kurihara等人基于xor的秘密共享方案,在Fujii等人基于xor的秘密共享方案的基础上,提出了一种完善的、理想的({1,3},n)层次式的秘密共享方案,使少数不可或缺的参与者具有实用性。我们在Intel赛扬G1820 2.70GHz和3.6GB RAM的PC上实现的系统可以在7.0Gbps左右的处理中恢复秘密。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信