{"title":"秘密共享与扩展系数的使用,以提高数据容量","authors":"Feng Shen, C. Mei, Hai Jiang, Zhiqian Xu","doi":"10.1109/SECON.2010.5453906","DOIUrl":null,"url":null,"abstract":"Secret sharing is a well-known method to distribute a secret amongst a group of participants whereas each of them holds a share of the secret. If a number of such shares are collected, the original secret will be retrieved. Since these shares look different from the secret itself, data security is accomplished. However, Shamir's secret sharing scheme imposes one potential restriction: the secret size should not be too big. To eliminate this scalability obstacle, this paper intends to modify the Shamir's scheme and utilize multiple coefficients in polynomials so that secret sharing can be turned into data sharing for data management in distributed environments. Both security and reliability are achieved. Performance analysis and experimental results have demonstrated the revised scheme's effectiveness.","PeriodicalId":286940,"journal":{"name":"Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Secret sharing with extended coefficient use for improved data capacity\",\"authors\":\"Feng Shen, C. Mei, Hai Jiang, Zhiqian Xu\",\"doi\":\"10.1109/SECON.2010.5453906\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Secret sharing is a well-known method to distribute a secret amongst a group of participants whereas each of them holds a share of the secret. If a number of such shares are collected, the original secret will be retrieved. Since these shares look different from the secret itself, data security is accomplished. However, Shamir's secret sharing scheme imposes one potential restriction: the secret size should not be too big. To eliminate this scalability obstacle, this paper intends to modify the Shamir's scheme and utilize multiple coefficients in polynomials so that secret sharing can be turned into data sharing for data management in distributed environments. Both security and reliability are achieved. Performance analysis and experimental results have demonstrated the revised scheme's effectiveness.\",\"PeriodicalId\":286940,\"journal\":{\"name\":\"Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-03-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECON.2010.5453906\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECON.2010.5453906","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secret sharing with extended coefficient use for improved data capacity
Secret sharing is a well-known method to distribute a secret amongst a group of participants whereas each of them holds a share of the secret. If a number of such shares are collected, the original secret will be retrieved. Since these shares look different from the secret itself, data security is accomplished. However, Shamir's secret sharing scheme imposes one potential restriction: the secret size should not be too big. To eliminate this scalability obstacle, this paper intends to modify the Shamir's scheme and utilize multiple coefficients in polynomials so that secret sharing can be turned into data sharing for data management in distributed environments. Both security and reliability are achieved. Performance analysis and experimental results have demonstrated the revised scheme's effectiveness.