Abstract
A multi-secret sharing scheme is a protocol to share more than one secret among a set of participants, where each secret may have a distinct family of subsets of participants (also called ‘access structure’) that are qualified to recover it. In this paper we use an information-theoretic approach to analyze two different models for multi-secret sharing schemes. The proposed models generalize specific models which have already been considered in the literature. We first analyze the relationships between the security properties of the two models. Afterwards, we show that the security property of a multi-secret sharing scheme does not depend on the particular probability distribution on the sets of secrets. This extends the analogous result for the case of single-secret sharing schemes and implies that the bounds on the size of the information distributed to participants in multi-secret sharing schemes can all be strengthened. For each of the two models considered in this paper, we show lower bounds on the size of the shares distributed to participants. Specifically, for the general case in which the secrets are shared according to a tuple of arbitrary (and possibly different) access structures, we show a combinatorial condition on these structures that is sufficient to require a participant to hold information of size larger than a certain subset of secrets. For specific access structures of particular interest, namely, when all access structures are threshold structures, we show tight bounds on the size of the information distributed to participants.
Similar content being viewed by others
References
J. C. Benaloh and J. Leichter, Generalized secret sharing and monotone functions, In Advances in Cryptology—CRYPTO ’88, Lecture Notes in Computer Science, Vol. 403, Springer-Verlag, Berlin (1990) pp. 27–35.
G. R. Blaley, Safeguarding cryptographic keys, Proceedings AFIPS 1979 National Computer Conference, (June 1979) pp. 313–317.
C. Blundo A. Santis ParticleDe R. Simone ParticleDe U. Vaccaro (1997) ArticleTitleTight bounds on the information rate of secret sharing schemes Design, Codes and Cryptography 11 IssueID2 235–259
C. Blundo, A. De Santis, G. Di Crescenzo, A. Giorgio Gaggia and U. Vaccaro, Multi-secret sharing schemes, In Advances in Cryptology—CRYPTO ’94, Lecture Notes in Computer Science, Vol. 839, Springer-Verlag, Berlin (1994) pp. 150–163.
C. Blundo A. Santis ParticleDe L. Gargano U. Vaccaro (1996) ArticleTitleOn the information rate of secret sharing schemes Theoretical Computer Science 154 283–306 Occurrence Handle10.1016/0304-3975(95)00065-8 Occurrence Handle97g:94019
C. Blundo A. Santis ParticleDe A. Giorgio Gaggia U. Vaccaro (1995) ArticleTitleNew bounds on the information rate of secret sharing schemes IEEE Transactions on Information Theory 41 549–554 Occurrence Handle10.1109/18.370169
C. Blundo A. Santis ParticleDe A. Herzberg S. Kutten U. Vaccaro M. Yung (1998) ArticleTitlePerfectly-secure key distribution for dynamic conference Information and Computation 146 IssueID1 1–23 Occurrence Handle10.1006/inco.1998.2717 Occurrence Handle99j:94039
C. Blundo A. Santis ParticleDe D. R. Stinson U. Vaccaro (1995) ArticleTitleGraph decomposition and secret sharing schemes Journal of Cryptology 8 39–64 Occurrence Handle10.1007/BF00204801
C. Blundo, A. De Santis and U. Vaccaro, Efficient sharing of many secrets, In Proceedings of STACS ’93 (10th Symp. on Theoretical Aspects of Computer Science), Lecture Notes in Computer Science, Vol. 665, Springer-Verlag, Berlin (1993) pp. 692–703.
C. Blundo A. Santis ParticleDe U. Vaccaro (1998) ArticleTitleOn secret sharing schemes Information Processing Letters 65 IssueID1 25–32 Occurrence Handle10.1016/S0020-0190(97)00194-4 Occurrence Handle99e:94031
E. F. Brickell D. R. Stinson (1992) ArticleTitleImproved bounds on the information rate of perfect secret sharing schemes Journal of Cryptology 5 IssueID3 153–166 Occurrence Handle93j:94021
R. M. Capocelli A. Santis ParticleDe L. Gargano U. Vaccaro (1993) ArticleTitleOn the size of shares for secret sharing schemes Journal of Cryptology 6 57–167 Occurrence Handle10.1007/BF00198463
T. M. Cover and J. A. Thomas, Elements of Information Theory, John Wiley & Sons (1991).
L. Csirmaz (1997) ArticleTitleThe size of a share must be large Journal of Cryptology 10 IssueID4 223–231 Occurrence Handle10.1007/s001459900029 Occurrence Handle0897.94012 Occurrence Handle98k:94008
A. Santis ParticleDe B. Masucci (1999) ArticleTitleMultiple ramp schemes IEEE Transactions on Information Theory 45 IssueID5 1720–1728
M. Dijk Particlevan (1995) ArticleTitleOn the information rate of perfect secret sharing schemes Design, Codes, and Cryptography 6 143–169 Occurrence Handle0829.94006
M. Franklin and M. Yung, Communication complexity of secure computation, Proceedings of 24th Annual ACM Symposium on Theory of Computing, (1992) pp. 699–710.
R. L. Graham D. E. Knuth O. Patashnik (1988) Concrete Mathematics. A Foundation for Computer Science Addison Wesley Reading, MA, USA
M. Ito, A. Saito and T. Nishizeki, Secret sharing scheme realizing general access structure, Proceedings of IEEE Global Telecommunications Conference— GLOBECOM 87, Tokyo, Japan, (1987) pp. 99–102.
M. Ito A. Saito T. Nishizeki (1993) ArticleTitleMultiple assignment scheme for sharing secret Journal of Cryptology 6 15–20 Occurrence Handle94b:94018
W.-A. Jackson, K. M. Martin and C. M. O’Keefe, Multisecret threshold schemes, In Advances in Cryptology—CRYPTO ’93, Lecture Notes in Computer Science, Vol. 773, Springer-Verlag, Berlin (1994) pp. 126–135.
W.-A. Jackson, K. M. Martin and C. M. O’Keefe, On sharing many secrets, In Advances in Cryptology—ASIACRYPT ’94, Lecture Notes in Computer Science , Vol. 917, Springer-Verlag, Berlin, (1995) pp. 42–54.
W.-A. Jackson, K. M. Martin and C. M. O’Keefe, A construction for multisecret threshold schemes, Design, Codes and Cryptography, Vol. 9, No. 3 (November 1996) pp. 287–303.
W.-A. Jackson K. M. Martin C. M. O’Keefe (1996) ArticleTitleIdeal secret sharing schemes with multiple secrets Journal of Cryptology 9 233–250 Occurrence Handle98e:94019
E. D. Karnin J. W. Greene M. E. Hellman (1983) ArticleTitleOn secret sharing systems IEEE Transactions on Information Theory 29 IssueID1 35–41 Occurrence Handle84i:94044
A. Shamir. How to share a secret, Communications of the ACM, Vol. 22, No. 11 (November 1979) pp. 612–613.
G.J. Simmons (1991) An introduction to shared secret and/or shared control schemes and their applications. Contemporary Cryptology IEEE Press New York 441–497
D. R. Stinson (1992) ArticleTitleAn explication of secret sharing schemes Design, Codes, and Cryptography 2 357–390 Occurrence Handle0793.68111 Occurrence Handle93m:94021
D. R. Stinson (1994) ArticleTitleDecomposition constructions for secret sharing schemes IEEE Transactions on Information Theory 40 118–125 Occurrence Handle10.1109/18.272461 Occurrence Handle0803.94017 Occurrence Handle95e:94047
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by: P. Wild
Rights and permissions
About this article
Cite this article
Masucci, B. Sharing Multiple Secrets: Models, Schemes and Analysis. Des Codes Crypt 39, 89–111 (2006). https://doi.org/10.1007/s10623-005-2761-1
Received:
Revised:
Accepted:
Issue Date:
DOI: https://doi.org/10.1007/s10623-005-2761-1