The breadth of Shamir's secret-sharing scheme

In 1979 Shamir and Blakley introduced the concept of secret sharing through threshold schemes. Their models were based on polynomials and finite geometries. Since 1979 many researchers have taken the basic concept of a threshold scheme and used other mathematical structures to adapt threshold schemes to meet the needs of many practical situations. In this paper the authors take Shamir's construction and show how it can be used to realize the adapted models. In particular, the authors give new constructions for multipart, multilevel, democratic and prepositioned schemes. It will also be demonstrated how known methods for detecting cheaters and disenrolling participants can be incorporated into Shamir's scheme.

[1]  Albrecht Beutelspacher,et al.  Geometric Structures as Threshold Schemes , 1986, EUROCRYPT.

[2]  Ehud D. Karnin,et al.  On secret sharing systems , 1983, IEEE Trans. Inf. Theory.

[3]  Gustavus J. Simmons,et al.  A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party , 1991, EUROCRYPT.

[4]  Ernest F. Brickell,et al.  Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.

[5]  G. R. Blakley,et al.  Threshold Schemes with Disenrollment , 1992, CRYPTO.

[6]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[7]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[8]  Douglas R. Stinson,et al.  An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..

[9]  Ernest F. Brickell,et al.  The Detection of Cheaters in Threshold Schemes , 1990, SIAM J. Discret. Math..

[10]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[11]  Gustavus J. Simmons,et al.  How to (Really) Share a Secret , 1988, CRYPTO.

[12]  Josh Benaloh,et al.  Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.