A Probabilistic Algorithm for Secret Matrix Share Size Reduction

Secret sharing is an important tool in cryptography and has many applications for wireless networks. This paper is motivated by the need for space-efficient secret sharing schemes. We first propose a simple probabilistic algorithm which can be used, prior to secret sharing, in order to split a given secret into public and private data. The public data can be made openly available, and any specific secret sharing method can be used in order to share the private data. We then show that, combined with a previously published space-efficient single secret sharing method, this yields a novel probabilistic matrix-based online multi-secret sharing method with small expected share size. In particular, compared with other matrix-based approaches, our scheme is of similar expected computational cost but smaller share size. Finally, we report on an implementation of our method and evaluate its performance. Our algorithm could be useful to design efficient secret sharing applications for wireless networks, in particular mobile ad-hoc networks, in areas such as secure routing, data transmission or key management. Index Terms—Space-Efficient Multi-Secret Sharing, Proba- bilistic Algorithms

[1]  Cheryl E. Praeger,et al.  Cyclic Matrices Over Finite Fields , 1995 .

[2]  Li Bai,et al.  A strong ramp secret sharing scheme using matrix projection , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[3]  Dharma P. Agrawal,et al.  Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[4]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[5]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[6]  Amos Beimel,et al.  Secret-Sharing Schemes: A Survey , 2011, IWCC.

[7]  Emmanouil A. Panaousis,et al.  ROBUST: Reliable overlay based utilisation of services and topology for emergency MANETs , 2010, 2010 Future Network & Mobile Summit.

[8]  Li Bai,et al.  A Proactive Secret Sharing Scheme in matrix projection method , 2009, Int. J. Secur. Networks.

[9]  Kai Wang,et al.  A Multiple Secret Sharing Scheme based on Matrix Projection , 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference.

[10]  Subhash C. Kak,et al.  Space efficient secret sharing for implicit data security , 2011, Inf. Sci..

[11]  Dawei Zhao,et al.  A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure , 2012, Comput. Math. Appl..

[12]  Christos Politis,et al.  Distributed Hash Tables for Peer-to-Peer Mobile Ad-hoc Networks with Security Extensions , 2012, J. Networks.