Abstract
In this paper, we will study the question of performing arbitrary updates in secret sharing schemes when shares of unaffected parties shall remain unchanged. We will introduce a new phase in the lifetime of secret sharing schemes to simplify constructions of multi-time secret sharing schemes and propose management models that allow unlimited updates from arbitrary schemes without need for broadcasts. As an example, we give an implementation based on Shamir’s threshold scheme.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Barwick, S.G., Jackson, W.-A., Martin, K.M., O’Keefe, C.: Optimal updating of ideal threshold schemes. Australasian Journal of Combinatorics 36, 123–132 (2006)
Barwick, S.G., Jackson, W.-A., Martin, K.M.: Updating the parameters of a threshold scheme by minimal broadcast. IEEE Transactions on Information Theory 51(2), 620–633 (2005)
Blakley, G.R.: Safeguarding Cryptographic Keys. In:Proceesings AFIPS 1979, National Computer Conference, vol. 48, pp. 313–317 (1979)
Blakley, B., Blakley, G.R., Chan, A.H., Massey, J.L.: Threshold schemes with disenrollment. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 540–548. Springer, Heidelberg (1993)
Blundo, C., Cresti, A., De Santis, A., Vaccaro, U.: Fully dynamic secret sharing schemes. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 110–125. Springer, Heidelberg (1994)
Cachin, C.: On-Line Secret Sharing. In: Boyd, C. (ed.) Cryptography and Coding 1995. LNCS, vol. 1025, pp. 190–198. Springer, Heidelberg (1995)
Ghodosi, H., Pieprzyk, J., Safavi-Naini, R.: Dynamic Threshold Cryptosystems: A New Scheme in Group Oriented Cryptography. In: Proceedings of PRAGOCRYPT 1996. International Conference on the Theory and Applications of Cryptology, pp. 370–379 (1996)
Martin, K.M.: Untrustworthy Participants in Secret Sharing Schemes, In: Cryptography and Coding III, pp. 255–264. Oxford University Press, Oxford (1993)
Martin, K.M.: Dynamic access policies for unconditionally secure secret sharing schemes. In: Proceedings of IEEE Information Theory Workshop (ITW 2005), Awaji Island, Japan (2005)
Pedersen, T.: A Threshold Cryptosystem without a Trusted Party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Heidelberg (1991)
Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)
Simmons, G.J.: How to (really) share a secret. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 390–448. Springer, Heidelberg (1988)
Simmons, G.J.: Prepositioned shared secret and/or shared control schemes. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 436–467. Springer, Heidelberg (1990)
Simmons, G.J.: An introduction to shared secret and/or shared control schemes and their applications. In: Contemporary Cryptology, pp. 441–497. IEEE Press, Los Alamitos (1992)
Stinson, D.R.: An explication of secret sharing schemes. In: Designs, Codes and Cryptography, pp. 357–390. Kluwer Academic Publishers, Dordrecht (1992)
Stoer, J., Bulirsch, R.: Introduction to Numerical Analysis. Springer, Heidelberg (2002)
Tompa, M., Woll, H.: How To Share a Secret with Cheaters. Journal of Cryptology, 133–138 (1988)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Beiter, M. (2008). Combiner Driven Management Models and Their Applications. In: Lucks, S., Sadeghi, AR., Wolf, C. (eds) Research in Cryptology. WEWoRC 2007. Lecture Notes in Computer Science, vol 4945. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88353-1_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-88353-1_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88352-4
Online ISBN: 978-3-540-88353-1
eBook Packages: Computer ScienceComputer Science (R0)