Skip to main content

On Multiplicative Secret Sharing Schemes

  • Conference paper
Information Security and Privacy (ACISP 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1841))

Included in the following conference series:

Abstract

As known, multiplicative secret sharing schemes over Abelian groups play an important role in threshold cryptography, such as in threshold RSA signature schemes. In this paper we present a new approach for constructing multiplicative threshold schemes over finite Abelian groups, which generalises a scheme proposed by Blackburn, Burmester, Desmedt and Wild in Eurocrypt’96. Our method is based on a notion of multiple perfect hash families, which we introduce in this paper. We also give several constructions for multiple perfect hash families from resolvable BIBD, difference matrix and error-correcting code.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alon, N., Naor, M.: Derandomization, witnesses for Boolean matrix multiplication and construction of perfect hash functions. Algorithmica 16, 434–449 (1996)

    Article  MATH  MathSciNet  Google Scholar 

  2. Atici, M., Magliveras, S.S., Stinson, D.R., Wei, W.D.: Some Recursive Constructions for Perfect Hash Families. Journal of Combinatorial Designs 4, 353–363 (1996)

    Article  MATH  MathSciNet  Google Scholar 

  3. Benaloh, J.C.: Secret sharing homomorphisms: Keeping shares of a secret secret. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 251–260. Springer, Heidelberg (1987)

    Google Scholar 

  4. Blackburn, S.R.: Combinatorics and Threshold Cryptology. In: Combinatorial Designs and their Applications (Chapman and Hall/CRC Research Notes in Mathematics), pp. 49–70. CRC Press, London (1999)

    Google Scholar 

  5. Blackburn, S.R., Burmester, M., Desmedt, Y., Wild, P.R.: Efficient multiplicative sharing schemes. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 107–118. Springer, Heidelberg (1996)

    Google Scholar 

  6. Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of AFIPS 1979 National Computer Conference, vol. 48, pp. 313–317 (1979)

    Google Scholar 

  7. Czech, Z.J., Havas, G., Majewski, B.S.: Perfect Hashing. Theoretical Computer Science 182, 1–143 (1997)

    Article  MATH  MathSciNet  Google Scholar 

  8. De Santis, A., Desmedt, Y., Frankel, Y., Yung, M.: How to share a function securely. In: Proc. 26th Annual Symp. on the Theory of Computing, pp. 522–533. ACM, New York (1994)

    Google Scholar 

  9. Desmedt, Y.: Some recent research aspects of threshold cryptography. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396, pp. 99–114. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  10. Desmedt, Y., Di Crescenzo, G., Burmester, M.: Multiplicative non-abelian sharing schemes and their application to threshold cryptography. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol. 917, pp. 21–32. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  11. Desmedt, Y., Frankel, Y.: Homomorphic zero-knowledge threshold schemes over any finite group. SIAM J. Disc. Math. 7, 667–679 (1994)

    Article  MATH  MathSciNet  Google Scholar 

  12. Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–490. Springer, Heidelberg (1994)

    Google Scholar 

  13. Jackson, W.-A., Martin, K., O’keefe, C.M.: Mutually trusted authority free secret sharing schemes. J. Cryptology 10, 261–289 (1997)

    Article  MATH  MathSciNet  Google Scholar 

  14. Mehlhorn, K.: Data Structures and Algorithms, vol. 1. Springer, Heidelberg (1984)

    Google Scholar 

  15. Shamir, A.: How to Share a Secret. Communications of the ACM 22, 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  16. Stinson, D.R.: An explication of secret sharing schemes. Des. Codes Cryptogr. 2, 357–390 (1992)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, H., Lam, K.Y., Xiao, GZ., Zhao, H. (2000). On Multiplicative Secret Sharing Schemes. In: Dawson, E.P., Clark, A., Boyd, C. (eds) Information Security and Privacy. ACISP 2000. Lecture Notes in Computer Science, vol 1841. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10718964_28

Download citation

  • DOI: https://doi.org/10.1007/10718964_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67742-0

  • Online ISBN: 978-3-540-45030-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics