基于m线性无关二值向量的快速(2,2 ^m)阈值秘密共享方案

Yuji Suga
{"title":"基于m线性无关二值向量的快速(2,2 ^m)阈值秘密共享方案","authors":"Yuji Suga","doi":"10.1109/NBiS.2013.90","DOIUrl":null,"url":null,"abstract":"Fast (k, n)-threshold secret sharing schemes with exclusive-OR operations have proposed by Kurihara et al. and Fujii et al. independently. Their method are ideal that share size is equal to the size of the data to be distributed with the benefits that can be handled very fast for using only XOR operation at distribution and restoration processes. In these cases for the number of shares n, target data must be equally divided into individual np-1 pieces where np is a prime more than n.The existing methods described above are configured using the cyclic matrices with prime order. On the other hand, a new method in WAIS2013 have proposed, this leads to general constructions of (2, p + 1)-threshold secret sharing schemes.In this paper, we use m-dimensional vector spaces over Z2 on having bases that meet certain conditions in order to construct proposed methods. This paper defines a new notion \"2-propagation bases set\" as a bases set to be used in the configuration. In order to guarantee the existence of (2; 2m)- threshold secret sharing schemes, we also treat the presence of the m-dimensional bases.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"79 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A Fast (2, 2^m)-Threshold Secret Sharing Scheme Using m Linearly Independent Binary Vectors\",\"authors\":\"Yuji Suga\",\"doi\":\"10.1109/NBiS.2013.90\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Fast (k, n)-threshold secret sharing schemes with exclusive-OR operations have proposed by Kurihara et al. and Fujii et al. independently. Their method are ideal that share size is equal to the size of the data to be distributed with the benefits that can be handled very fast for using only XOR operation at distribution and restoration processes. In these cases for the number of shares n, target data must be equally divided into individual np-1 pieces where np is a prime more than n.The existing methods described above are configured using the cyclic matrices with prime order. On the other hand, a new method in WAIS2013 have proposed, this leads to general constructions of (2, p + 1)-threshold secret sharing schemes.In this paper, we use m-dimensional vector spaces over Z2 on having bases that meet certain conditions in order to construct proposed methods. This paper defines a new notion \\\"2-propagation bases set\\\" as a bases set to be used in the configuration. In order to guarantee the existence of (2; 2m)- threshold secret sharing schemes, we also treat the presence of the m-dimensional bases.\",\"PeriodicalId\":261268,\"journal\":{\"name\":\"2013 16th International Conference on Network-Based Information Systems\",\"volume\":\"79 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-09-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 16th International Conference on Network-Based Information Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NBiS.2013.90\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 16th International Conference on Network-Based Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NBiS.2013.90","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

Kurihara et al.和Fujii et al.分别提出了具有异或操作的快速(k, n)阈值秘密共享方案。他们的方法是理想的,共享大小等于要分发的数据的大小,其优点是在分发和恢复过程中只使用异或操作可以非常快速地处理。在这些情况下,对于共享的数量n,目标数据必须平均地分成单独的np-1块,其中np是大于n的素数。上述现有方法使用素数阶的循环矩阵进行配置。另一方面,在WAIS2013中提出了一种新的方法,这导致了(2,p + 1)-阈值秘密共享方案的一般构造。在本文中,我们利用Z2上的m维向量空间,在满足一定条件的基上构造所提出的方法。本文定义了一个新的概念“2-传播基集”作为组态中使用的基集。为了保证(2)的存在;2m)-阈值秘密共享方案,我们也处理m维基的存在。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Fast (2, 2^m)-Threshold Secret Sharing Scheme Using m Linearly Independent Binary Vectors
Fast (k, n)-threshold secret sharing schemes with exclusive-OR operations have proposed by Kurihara et al. and Fujii et al. independently. Their method are ideal that share size is equal to the size of the data to be distributed with the benefits that can be handled very fast for using only XOR operation at distribution and restoration processes. In these cases for the number of shares n, target data must be equally divided into individual np-1 pieces where np is a prime more than n.The existing methods described above are configured using the cyclic matrices with prime order. On the other hand, a new method in WAIS2013 have proposed, this leads to general constructions of (2, p + 1)-threshold secret sharing schemes.In this paper, we use m-dimensional vector spaces over Z2 on having bases that meet certain conditions in order to construct proposed methods. This paper defines a new notion "2-propagation bases set" as a bases set to be used in the configuration. In order to guarantee the existence of (2; 2m)- threshold secret sharing schemes, we also treat the presence of the m-dimensional bases.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信