Skip to main content
Log in

Practical secret sharing scheme realizing generalized adversary structure

  • Information Security
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

Most existing secret sharing schemes are constructed to realize general access structure, which is defined in terms of authorized groups of participants, and is unable to be applied directly to the design of intrusion tolerant system, which often concerns corruptible groups of participants instead of authorized ones. Instead, the generalized adversary structure, which specifies the corruptible subsets of participants, can be determined directly by exploit of the system setting and the attributes of all participants. In this paper an efficient secret sharing scheme realizing generalized adversary structure is proposed, and it is proved that the scheme satisfies both properties of the secret sharing scheme, i.e., the reconstruction property and the perfect property. The main features of this scheme are that it performs modular additions and subtractions only, and each share appears in multiple share sets and is thus replicated. The former is an advantage in terms of computational complexity, and the latter is an advantage when recovery of some corrupted participants is necessary. So our scheme can achieve lower computation cost and higher availability. Some reduction on the scheme is also done finally, based on an equivalence relation defined over adversary structure. Analysis shows that reduced scheme still preserves the properties of the original one.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Shamir A. How to share a secret.Communication of the ACM, 1979, 22(11): 612–613.

    Article  MATH  MathSciNet  Google Scholar 

  2. Blakley G R. Safeguarding cryptographic keys. InProc. the National Computer Conference, American Federation of Information Processing Societies Proceedings, 1979, 48: 313–317.

  3. Ito M, Saito A, Nishizeki T. Multiple assignment scheme for sharing secret.Journal of Cryptology, 1993, 6(1): 15–20.

    Article  MATH  MathSciNet  Google Scholar 

  4. Benaloh J, Leichter J. Generalized secret sharing and monotone functions. InAdvances in Cryptology-CRYPTO'88, Shafi Goldwasser (ed.), Santa Barbara, California. USA. 1988,LNCS 403, Springer-Verlag, pp.27–35.

  5. Cramer R, Damgard I, Maurer U. General secure multi-party computation from any linear secret sharing scheme. InAdvances in Cryptology — EUROCRYPT 2000, Preneel B (ed.), Bruges, Belgium, 2000,LNCS 1807, Springer-Verlag, pp.316–334.

  6. Tan K J, Zhu H W. General secret sharing scheme.Computer Communications, 1999, 22(8): 755–757.

    Article  Google Scholar 

  7. Malkni D, Reiter M K. Byzantine Quorum systems.Distributed Computing, 1998, 11(4): 203–213.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuan-Bo Guo.

Additional information

This research is supported by the National Natural Science Foundation of China (Grant No. 90204012) and the National Hi-Tech Research and Development 863 Program of China (Grant No. 2002AA143021).

Yuan-Bo Guo received his B.S. and M.S. degrees from the PLA Information Engineering University in 1997 and 2000, respectively. Now, he is a Ph.D. candidate in Xidian University. His research interests include secret sharing, intrusion tolerance and cryptographic protocol design and analysis.

Jian-Feng Ma received his Ph.D. degree in communication and electronic systems in 1995 from Xidian University. He is now a professor and the vice-dean of School of Computer in Xidian University. He is also the director of Key Laboratory of Computer Networks and Information Security (Xidian University), Ministry of Education, P.R. China. Currently, Dr. MA is mainly engaged in the research of channel coding, information and network security. He is a member of IEEE.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Guo, YB., Ma, JF. Practical secret sharing scheme realizing generalized adversary structure. J. Compt. Sci. & Technol. 19, 564–569 (2004). https://doi.org/10.1007/BF02944759

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02944759

Key words

Navigation