skip to main content
10.1145/2897795.2897810acmotherconferencesArticle/Chapter ViewAbstractPublication PagescisrcConference Proceedingsconference-collections
research-article

Efficient Algorithm to Construct Perfect Secret Sharing Scheme for a Given Access Structure

Authors Info & Claims
Published:05 April 2016Publication History

ABSTRACT

The threshold scheme, the monotone circuit construction, and the vector space construction are some of the well-known secret sharing schemes in cryptography. The threshold and monotone circuit secret sharing schemes are fairly easy to construct for any given access structure Γ. The construction of a secret sharing scheme realizing a given access structure Γ with Vector Space Construction requires the existence of a function φ from a set of participants into a vector space, that is, φ: P → (Zp)d. This function φ must satisfy certain conditions in order to recover the secret key. There is no known algorithm to construct such a function φ in general. Constructions are mainly done by trial and error. In this paper, we develop polynomial algorithm to construct such φ function(s) for given access structures. Using the φ function, we also give an algorithm to construct secret sharing scheme for the access structures.

References

  1. M. Atici, Secret Sharing Scheme: Vector Space Secret Sharing Scheme and &phis; Function, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, August 26--29, Istanbul-Turkey. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Atici,Vector Space Secret Sharing and an Efficient Algorithm to Construct a &phis; Function, ACMSE'13, April 4--6, 2013, Savannah, GA, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. Benaloh and J. Leichter, Generalized secret sharing and monotone functions, Lecture notes in Computer Science, 403(1990), pp. 27--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. G. R. Blakley, Safegarding crytographic keys, Federal information Processing Standard Conference Proceedings, 48(1979), pp. 313--317.Google ScholarGoogle Scholar
  5. E. F. Brickell(Ed), Advances in Cryptology-CRYPTO'92 Proceedings, Lecture Notes in Computer Science, vol. 740, Springer, 1993.Google ScholarGoogle Scholar
  6. M. Ito, A. Saito, and T. Hishizeki, Secret sharing scheme realizing general access structure, Proceedings IEEE Globecom '87(1987), pp. 99--102.Google ScholarGoogle Scholar
  7. A. Shamir, How to share a secret, Communication of the ACM,22(1979), pp. 612--613. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. R. Stinson, Crtptography Theory and Practice, Chapman and Hall/CRC, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Efficient Algorithm to Construct Perfect Secret Sharing Scheme for a Given Access Structure

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CISRC '16: Proceedings of the 11th Annual Cyber and Information Security Research Conference
      April 2016
      150 pages
      ISBN:9781450337526
      DOI:10.1145/2897795

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 5 April 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      CISRC '16 Paper Acceptance Rate11of28submissions,39%Overall Acceptance Rate69of136submissions,51%
    • Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader