A RAMP CODE FOR FINE -GRAINED ACCESS CONTROL

Threshold ramp secret sharing schemes are designed so that (i) certain subsets of shares have no information about the secret, (ii) some subsets have partial information about the secret and (iii) some subsets have complete information to recover the secret. However most of the ramp schemes in present literature do not control the leakage of information in partial access sets, due to which the information acquired by these sets is devoid of structure and not useful for fine-grained access control. Through a non-perfect secret sharing scheme called MIX-SPLIT, an encoding methodology for controlling the leakage in partial access sets is proposed and this is used for fine-grained access to binary strings. The ramp code generated using MIX-SPLIT requires a much smaller share size of O(n), as compared to Shamir's ramp adaptation which incurs a share size of atleast O(n 2 ) for the same multi-access structure. The proposed ramp code is finally applied towards the protection and fine-grained access of industrial design drawings.

[1]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[2]  Kannan Karthik,et al.  Secure Group Authentication Using a Non-Perfect Secret Sharing Scheme Based on Controlled Mixing , 2009, 2009 Annual IEEE India Conference.

[3]  Kannan Karthik,et al.  Multimedia Encoding for Access Control with Traitor Tracing - Balancing Secrecy, Privacy and Traceability , 2008 .

[4]  Ehud D. Karnin,et al.  On secret sharing systems , 1983, IEEE Trans. Inf. Theory.

[5]  Xiao Liangliang,et al.  Linear multi-secret sharing schemes , 2005 .

[6]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[7]  Kannan Karthik,et al.  A Unified Approach To Construct Non-perfect Secret Sharing And Traitor Tracing Schemes , 2007, Security and Management.

[8]  Kannan Karthik,et al.  Secure fingerprint embedding based on modified GDFT based parametric transform , 2011, 2011 International Conference on Image Information Processing.

[9]  Liangliang Xiao,et al.  Linear multi-secret sharing schemes , 2007, Science in China Series F: Information Sciences.

[10]  Mitsuru Ito,et al.  Secret sharing scheme realizing general access structure , 1989 .

[11]  Catherine A. Meadows,et al.  Security of Ramp Schemes , 1985, CRYPTO.

[12]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[13]  László Csirmaz Ramp secret sharing and secure information storage , 2009 .