Abstract
In a conventional secret sharing scheme a dealer uses secure point-to-point channels to distribute the shares of a secret to a number of participants. At a later stage an authorised group of participants send their shares through secure point-to-point channels to a combiner who will reconstruct the secret. In this paper, we assume no point-to-point channel exists and communication is only through partial broadcast channels. A partial broadcast channel is a point-to-multipoint channel that enables a sender to send the same message simultaneously and privately to a fixed subset of receivers. We study secret sharing schemes with partial broadcast channels, called partial broadcast secret sharing schemes. We show that a necessary and sufficient condition for the partial broadcast channel allocation of a (t, n)-threshold partial secret sharing scheme is equivalent to a combinatorial object called a cover-free family. We use this property to construct a (t, n)-threshold partial broadcast secret sharing scheme with O(log n) partial broadcast channels. This is a significant reduction compared to n point-to-point channels required in a conventional secret sharing scheme. Next, we consider communication rate of a partial broadcast secret sharing scheme defined as the ratio of the secret size to the total size of messages sent by the dealer. We show that the communication rate of a partial broadcast secret sharing scheme can approach 1/O(log n) which is a significant increase over the corresponding value, 1/n, in the conventional secret sharing schemes. We derive a lower bound on the communication rate and show that for a (t,n)-threshold partial broadcast secret sharing scheme the rate is at least 1/t and then we propose constructions with high communication rates. We also present the case of partial broadcast secret sharing schemes for general access structures, discuss possible extensions of this work and propose a number of open problems.
Similar content being viewed by others
References
N Alon (1986) ArticleTitleExplicit construction of exponential sized families of k-independent sets Disc Maths 58 191–193 Occurrence Handle0588.05003 Occurrence Handle829076 Occurrence Handle10.1016/0012-365X(86)90161-5
M Atici SS Magliveras DR Stinson WD Wei (1996) ArticleTitleSome recursive constructions for perfect hash families J Combin Designs 4 353–363 Occurrence Handle0914.68087 Occurrence Handle1402122 Occurrence Handle10.1002/(SICI)1520-6610(1996)4:5<353::AID-JCD4>3.0.CO;2-E
J Benaloh J Leichter (1988) ArticleTitleGeneralised secret sharing and monotone functions Adv Cryptol – CRYPTO ’ 88 IssueIDLNCS 403 27–35
Ben-Or M, Goldwasser S, Wigderson A (1988) Completeness theorems for non-cryptographic fault-tolerant distributed computing. Proc ACM STOC, ’88, ACM Press, pp 1–10
Beimel A, Chor B (1998) Secret sharing with public reconstruction. IEEE Trans Info Theory 44(5):1887–1896 (Extended abstract in Crypto’95)
J Bierbrauer (1997) ArticleTitleUniversal hashing and geometric codes Designs Codes Cryptogr 11 207–221 Occurrence Handle0876.94044 Occurrence Handle1451727 Occurrence Handle10.1023/A:1008226810363
Blackburn SR (1999) Combinatorics and threshold cryptology, Combinatorial Designs and their Applications (Chapman and Hall/CRC Research Notes in Mathematics). CRC Press, London, pp 49–70
SR Blackburn M Burmester Y Desmedt PR Wild (1996) ArticleTitleEfficient multiplicative sharing schemes Adv Cryptol – Eurocrypt ’96, LNCS 96 IssueID1070 107–118 Occurrence Handle1421582
SR Blackburn PR Wild (1998) ArticleTitleOptimal linear perfect hash families J Combin Theory Ser A 83 233–250 Occurrence Handle0914.68088 Occurrence Handle1636981 Occurrence Handle10.1006/jcta.1998.2876
GR Blakey (1979) ArticleTitleSafeguarding cryptographic keys Proc AFIPS 1979 National Computer Conference 48 313–317
GR Blakely C Meadows (1984) ArticleTitleSecurity of ramp schemes Adv Cryptol: Crypto ’84, LNCS 196 242–268
C Blundo A Santi ParticleDe DR Stinson U Vaccaro (1995) ArticleTitleGraph decompositions and secret sharing schemes J Cryptol 8 39–64 Occurrence Handle0816.94013 Occurrence Handle10.1007/BF00204801
Brickell EF (1991) A problem in broadcast encryption. Presented at 5th Vermont Summer Workshop on Combinatorics and Graph Theory, June 1991
RM Capocelli A De Santis L Gargano U Vaccaro (1993) ArticleTitleOn the size of shares for secret sharing schemes J Cryptol 6 157–169 Occurrence Handle0786.68030 Occurrence Handle10.1007/BF00198463
JL Carter MN Wegman (1979) ArticleTitleUniversal classes of hash functions JComp Syst Sci 18 143–154 Occurrence Handle0412.68090 Occurrence Handle532173 Occurrence Handle10.1016/0022-0000(79)90044-8
Chaum D, Crepeau C, Damgård I (1988) Multiparty unconditional secure protocols. Proc ACM STOC ’88, ACM Press, pp 11–19
TM Cover JA Thomas (1991) Elements of Information Theory John Wiley & Sons New York Occurrence Handle0762.94001
ZJ Czech G Havas BS Majewski (1997) ArticleTitlePerfect hashing Theor Comp Sci 182 1–143 Occurrence Handle0954.68060 Occurrence Handle1463931 Occurrence Handle10.1016/S0304-3975(96)00146-6
Y Desmedt (1997) ArticleTitleSome recent research aspects of threshold cryptography 1997 Information Security Workshop, Japan (JSW ’97), LNCS 1396 99–114
Desmedt Y, Safavi-Naini R, Wang H, Chris C, Pieprzyk J (1999) Broadcast Anti-jamming systems, ICON ’99, IEEE International Conference on Networks. IEEE Computer Society, pp 349–355
Desmedt Y, Jajodia S (1997) Redistributing secret shares to new access structures and its applications, Preprint
P Erdös P Frankl Z Furedi (1985) ArticleTitleFamilies of finite sets in which no set is covered by the union of r others Israel J Math 51 79–89 Occurrence Handle0587.05021 Occurrence Handle804477
ML Fredman J Komlòs (1984) ArticleTitleOn the size of separating systems and families of perfect hash functions SIAM J Alg Disc Methods 5 61–68 Occurrence Handle0525.68037
A Fiat M Naor (1994) ArticleTitleBroadcast encryption Adv Cryptol – Crypto ’93, LNCS 773 480–490 Occurrence Handle0870.94026
Franklin M, Yung M (1995) Secure hypergraphs: privacy from partial broadcast. Proc ACM STOC ’95, ACM Press, pp 36–44
T Helleseth T Johansson (1996) ArticleTitleUniversal hash functions from exponential sums over finite fields and Galois Rings Adv Cryptol – Crypto’96, LNCS 96 IssueIDLNCS 1109 31–44 Occurrence Handle1480669
Ito M, Saito A, Nishizeki T (1987) Secret sharing scheme realizing general access structure. Proceedings IEEE Global Telecommun. Conf., Globecom ’87, Washington, IEEE Communications Soc. Press, pp 99–102
WA Jackson KM Martin (1996) ArticleTitleA combinatorial interpretation of ramp schemes Austral J Combin 14 51–60 Occurrence Handle0862.94016 Occurrence Handle1424321
E Karnin J Greene M Hellman (1983) ArticleTitleOn secret sharing systems IEEE Trans Inform Theory 29 35–41 Occurrence Handle0503.94018 Occurrence Handle711276 Occurrence Handle10.1109/TIT.1983.1056621
R Kumar S Rajagopalan A Sahai (1999) ArticleTitleCoding constructions for blacklisting problems without computational assumptions Adv Cryptol – CRYPTO ’99, LNCS 1666 609–623 Occurrence Handle0942.94004
K Kurosawa T Yoshida (1999) ArticleTitleStrongly universal hashing and identification codes via channels IEEE Tran IT 45 IssueID6 2091–2095 Occurrence Handle0958.94012 Occurrence Handle1720661
K Martin R Safavi-Naini H Wang (1999) ArticleTitleBounds and techniques for efficient redistribution of secret shares to new access structures Comp J 42 IssueID8 638–649 Occurrence Handle0955.68045 Occurrence Handle10.1093/comjnl/42.8.638
Mehlhorn K (1984) Data structures and algorithms, vol 1. Springer-Verlag
W. Ogata K Kurosawa (1998) ArticleTitleSome basic properties of general nonperfect secret sharing schemes J Universal Comp Sci 4 IssueID8 690–704 Occurrence Handle0967.68060 Occurrence Handle1654143
M Ruszinko (1994) ArticleTitleOn the upper bound of the size of the r-cover-free families J Combin Theory A 66 302–310 Occurrence Handle0798.05071 Occurrence Handle1275736 Occurrence Handle10.1016/0097-3165(94)90067-1
A Shamir (1979) ArticleTitleHow to share a secret Commun ACM 22 612–613 Occurrence Handle0414.94021 Occurrence Handle549252 Occurrence Handle10.1145/359168.359176
DR Stinson (1992) ArticleTitleAn explication of secret sharing schemes Des Codes Cryptogr 2 357–390 Occurrence Handle0793.68111 Occurrence Handle1194776 Occurrence Handle10.1007/BF00125203
DR Stinson (1996) ArticleTitleOn the connection between universal hashing, combinatorial designs and error-correcting codes Congress Numerant 114 7–27 Occurrence Handle0897.68048 Occurrence Handle1421130
DR Stinson T Trung Particlevan R Wei (2000) ArticleTitleSecure frameproof codes, key distribution patterns, group testing algorithms and related structures J Statist Plan Infer 86 595–617 Occurrence Handle1054.94013 Occurrence Handle10.1016/S0378-3758(99)00131-7
DR Stinson R Wei L Zhu (2000) ArticleTitleNew constructions for perfect hash families and related structures using combinatorial designs and codes J Combin Designs 8 189–200 Occurrence Handle0956.68159 Occurrence Handle1752734 Occurrence Handle10.1002/(SICI)1520-6610(2000)8:3<189::AID-JCD4>3.0.CO;2-A
DR Stinson R Wei L Zhu (2000) ArticleTitleSome new bounds for cover-free families J Combin Theory A 90 224–234 Occurrence Handle0948.05055 Occurrence Handle1749434 Occurrence Handle10.1006/jcta.1999.3036
MN Wegman JL Carter (1981) ArticleTitleNew hash functions and their use in authentication and set equality J Comp Syst Sci 22 265–279 Occurrence Handle0461.68074 Occurrence Handle633535 Occurrence Handle10.1016/0022-0000(81)90033-7
C Xing H Wang KY Lam (2000) ArticleTitleConstructions of authentication codes from algebraic curves over finite fields IEEE Trans Info Theory 46 886–892 Occurrence Handle0997.94028 Occurrence Handle1763467 Occurrence Handle10.1109/18.841168
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by P. Wild.
Rights and permissions
About this article
Cite this article
Safavi-Naini, R., Wang, H. Secret sharing schemes with partial broadcast channels. Des Codes Crypt 41, 5–22 (2006). https://doi.org/10.1007/s10623-006-0027-1
Received:
Revised:
Accepted:
Issue Date:
DOI: https://doi.org/10.1007/s10623-006-0027-1