Scalable Threshold Closure

Secret sharing is an important concept for implementing robust and secure computer systems. A (t,l)-threshold scheme such as Shamir's (Commun. ACM22(11) (1979) 612–613) is a mechanism that allows a set of l participants to share a secret such that only subsets of t or more participants can reconstruct it. The threshold scheme, though simple and easy to implement, is not flexible enough to support complex secret sharing policies typical in practical systems. An access structure (Benaloh and Leichter, Advances in Cryptology – CRYPTO’88, Lecture Notes in Computer Science, vol. 403, Springer, Berlin, 1990, pp. 27–35; Ito et al., Globecom’87, Tokyo, Japan, 1987, pp. 99–102), on the other hand, is a powerful concept by which complex secret sharing schemes may be represented. However, the implementation is very complicated when the access structure contains a great number of authorized sets. This paper introduces a new construction for the secret sharing schemes called threshold closure, which allows a complex access structure it represents to be realized by possibly the fewest number of (t,l)-threshold schemes.

[1]  Cunsheng Ding,et al.  How to Build Robust Shared Control Systems , 1998, Des. Codes Cryptogr..

[2]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[3]  Gustavus J. Simmons,et al.  An Introduction to Shared Secret and/or Shared Control Schemes and Their ApplicationThis work was performed at Sandia National Laboratories and supported by the U.S. Department of Energy under contract number DEAC0476DPOO789. , 1992 .

[4]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[5]  James G. Oxley,et al.  Matroid theory , 1992 .

[6]  Cunsheng Ding,et al.  The access structure of some secret-sharing schemes , 1996, ACISP.

[7]  Ernest F. Brickell,et al.  Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.

[8]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[9]  Mitsuru Ito,et al.  Secret sharing scheme realizing general access structure , 1989 .

[10]  Gustavus J. Simmons,et al.  How to (Really) Share a Secret , 1988, CRYPTO.

[11]  Douglas R. Stinson,et al.  A Combinatorial Approach to Threshold Schemes , 1987, CRYPTO.

[12]  Cunsheng Ding,et al.  A nonlinear secret sharing scheme , 1996, ACISP.

[13]  Douglas R. Stinson,et al.  An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..

[14]  Douglas R. Stinson,et al.  Anonymous Secret Sharing Schemes , 1997, Discret. Appl. Math..

[15]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[16]  Josh Benaloh,et al.  Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.