Abstract
A multisecret threshold scheme is a system that protects a number of secrets (or keys) among a group of participants, as follows. Given a set of n participants, there is a secret s K associated with each k–subset K of these participants. The scheme ensures that s K can be reconstructed by any group of t participants in K (\(1 < t < k\)). A lower bound has been established on the amount of information that participants must hold in order to ensure that any set of up to w participants \((0 \leqslant w \leqslant n - k + t - 1)\) cannot obtain any information about a secret with which they are not associated. In this paper, for parameters t=2 and w=n-k+t-1, we give a construction for multisecret threshold schemes that satisfy this bound.
Similar content being viewed by others
References
R. Blom, An Optimal class of symmetric key generation systems. Advances in Cryptology-Eurocrypt '84, Lecture Notes in Computer Science. Vol. 209 (1984) 335–338.
C. Hiundo, A. De Santis. A. Hemberg, S. Kutlen, U. Vaccaro. and M. Yung. Perfectly-secure key disuibution for dynamic conferences. Advances in Cryptology-Crypto '92, Lecture Notes in Computer Science, Vol. 740 (1993) 471–486
J. W. P Hirschfeld: Projective geometries overfinirefieldr. Clarendon Press (1979).
W.-A. Jackson and K. M. Martin. Geometric secret sharing schemes and their duals. Des. Codes Crypfogr Vol. 4 (1994) 83–95.
W.-A. Jackson, K. M. Martin. and C.M O'Keefe. Multisecret threshold schemes. Advances in Cryptology-Crypta '93. Lecm Notes in Computer Scicnce. Vol 773 (1994) 126–135.
R. Lid1 and H. Niederreiter: Finire Fields. Cambridge University Press, Cambridge (1983).
T. Matsurnolo and H. Irnai. On the key predistribution system: A practical solution to the key predistribution problem. Advances in Cryptology: Crypto '87, Lecture Notes in Computer Science, Vol. 293 (1987) 183–193.
G. J. Simmons. An introdunion to shared sem mdlor shared control scbernes and their application. Contrmpomly Cryptology: The Science of Information Integrity. EEE Press (1992).
D. R. Stinson. An explication of secrrt sharing schemes. Des, Codos Clyptogr: Vol. 2 (1992) 357–390.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Jackson, WA., Martin, K.M. & O'Keefe, C.M. A Construction for Multisecret Threshold Schemes. Designs, Codes and Cryptography 9, 287–303 (1996). https://doi.org/10.1023/A:1027380522085
Issue Date:
DOI: https://doi.org/10.1023/A:1027380522085