skip to main content
10.1145/2498328.2500081acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
research-article

Vector space secret sharing and an efficient algorithm to construct a ϕ function

Published:04 April 2013Publication History

ABSTRACT

The threshold scheme, the monotone circuit construction, and the vector space construction are some of the well-known secret sharing schemes in cryptography. The threshold and monotone circuit secret sharing schemes are fairly easy to construct for any given access structure Γ. The construction of a secret sharing scheme realizing a given access structure Γ with Vector Space Construction requires the existence of a function ϕ from a set of participants into a vector space, that is, ϕ: P → (Zp)d. This function ϕ must satisfy certain conditions. There is no known algorithm to construct such a function ϕ in general. Constructions are mainly done by trial and error. In this paper, we develop polynomial algorithms to construct ϕ functions for vector space secret sharing scheme realizing certain types of access structures. Some examples are given to illustrate the algorithms.

References

  1. M. Atici, Secret Sharing Scheme: Vector Space Secret Sharing Scheme and φ Function, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, August 26--29, Istanbul-Turkey. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Benaloh and J. Leichter, Generalized secret sharing and monotone functions, Lecture notes in Computer Science, 403(1990), pp. 27--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. G. R. Blakley, Safegarding crytographic keys, Federal information Processing Standard Conference Proceedings, 48(1979), pp. 313--317.Google ScholarGoogle Scholar
  4. E. F. Brickell(Ed), Advances in Cryptology-CRYPTO'92 Proceedings, Lecture Notes in Computer Science, vol. 740, Springer, 1993.Google ScholarGoogle Scholar
  5. M. Ito, A. Saito, and T. Hishizeki, Secret sharing scheme realizing general access structure, Proceedings IEEE Globecom '87(1987), pp. 99--102.Google ScholarGoogle Scholar
  6. A. Shamir, How to share a secret, Communication of the ACM, 22(1979), pp. 612--613. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. R. Stinson, Crtptography Theory and Practice, Chapman and Hall/CRC, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Vector space secret sharing and an efficient algorithm to construct a ϕ function

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ACMSE '13: Proceedings of the 51st ACM Southeast Conference
      April 2013
      224 pages
      ISBN:9781450319010
      DOI:10.1145/2498328
      • General Chair:
      • Ashraf Saad

      Copyright © 2013 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 April 2013

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate178of377submissions,47%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader