Computationally perfect compartmented secret sharing schemes based on MDS codes

Two compartmented secret sharing schemes are proposed in this paper. Constructions of the proposed schemes are based on the maximum distance separable (MDS) codes. One of the proposed schemes is perfect in classical sense and the other scheme, what we call, is computationally perfect. By computationally perfect, we mean, an authorised set can always reconstruct the secret in polynomial time whereas for an unauthorised set this is computationally hard. This is in contrast to some of the existing schemes in the literature, in which an authorised set can recover the secret only with certain probability. Also, in our schemes unlike in some of the existing schemes, the size of the ground field need not be extremely large. One of the proposed schemes is shown to be ideal and the information rate for the other scheme is 1/2. Both the schemes are efficient and require O ( mn 3 ), where n is the number of participants and m is the number of compartments.

[1]  K. Srinathan,et al.  On the Power of Computational Secret Sharing , 2003, INDOCRYPT.

[2]  Ernest F. Brickell,et al.  Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.

[3]  V. Ch. Venkaiah,et al.  Computationally Perfect Secret Sharing Scheme Based on Error-Correcting Codes , 2014, SNDS.

[4]  Josef Pieprzyk,et al.  Secret Sharing in Multilevel and Compartmented Groups , 1998, ACISP.

[5]  Tamir Tassa Hierarchical Threshold Secret Sharing , 2004, TCC.

[6]  Germán Sáez,et al.  New Results on Multipartite Access Structures , 2006, IACR Cryptol. ePrint Arch..

[7]  Gustavus J. Simmons,et al.  How to (Really) Share a Secret , 1988, CRYPTO.

[8]  Carles Padró,et al.  Natural Generalizations of Threshold Secret Sharing , 2011, IEEE Transactions on Information Theory.

[9]  R. J. McEliece,et al.  On sharing secrets and Reed-Solomon codes , 1981, CACM.

[10]  Ferruh Özbudak,et al.  Secret Sharing Schemes and Linear Codes , 2012 .

[11]  Ehud D. Karnin,et al.  On secret sharing systems , 1983, IEEE Trans. Inf. Theory.

[12]  V. Ch. Venkaiah,et al.  Ideal and Perfect Hierarchical Secret Sharing Schemes based on MDS codes , 2013, IACR Cryptol. ePrint Arch..

[13]  Michael J. Collins A Note on Ideal Tripartite Access Structures , 2002, IACR Cryptol. ePrint Arch..

[14]  Siaw-Lynn Ng Ideal secret sharing schemes with multipartite access structures , 2006 .

[15]  Tamir Tassa,et al.  Characterizing Ideal Weighted Threshold Secret Sharing , 2008, SIAM J. Discret. Math..

[16]  Ali Aydin Selçuk,et al.  Joint Compartmented Threshold Access Structures , 2013, IACR Cryptol. ePrint Arch..

[17]  G. R. Blakley,et al.  Ideal perfect threshold schemes and MDS codes , 1995, Proceedings of 1995 IEEE International Symposium on Information Theory.

[18]  Appala Naidu Tentu,et al.  Conjunctive Hierarchical Secret Sharing Scheme Based on MDS Codes , 2013, IWOCA.

[19]  Ferruh Özbudak,et al.  On Hierarchical Threshold Access Structures , 2010 .

[20]  Nira Dyn,et al.  Multipartite Secret Sharing by Bivariate Interpolation , 2008, Journal of Cryptology.

[21]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[22]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[23]  Carles Padró,et al.  Ideal Multipartite Secret Sharing Schemes , 2007, Journal of Cryptology.