Sure Interpolation and Its Application to Hierarchical Threshold Secret Sharing Scheme

A threshold secret sharing scheme permits a secret to be shared among participants in such a way that only qualified subsets of participants can recover the secret. Threshold secret sharing is useful in management of cryptographic keys. Based on Birkhoff interpolation, Tassa has proposed an ideal hierarchical threshold secret sharing scheme. Then based on Sure interpolation and participants' identity, we present another ideal hierarchical threshold secret sharing scheme. Sure interpolation is simple and easy interpolation method to use in hierarchical threshold secret sharing scheme. At last, we analyze the ideal threshold secret sharing scheme based on Sure interpolation, which is more easy and simple to compute and implement in the real life.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Tamir Tassa,et al.  Characterizing Ideal Weighted Threshold Secret Sharing , 2008, SIAM J. Discret. Math..

[3]  I. J. Schoenberg On Hermite-Birkhoff interpolation☆ , 1966 .

[4]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[5]  Tamir Tassa,et al.  Hierarchical Threshold Secret Sharing , 2004, Journal of Cryptology.

[6]  Kendall E. Atkinson,et al.  A Partial Characterization of Poised Hermite–Birkhoff Interpolation Problems , 1969 .