({1,3},n) Hierarchical Secret Sharing Scheme Based on XOR Operations for a Small Number of Indispensable Participants

Blakley and Shamir independently introduce the basic idea of a (k, n) threshold secret sharing scheme in 1979. Shamir also recognize the concept of a hierarchical scheme, and suggests accomplishing the scheme by giving the participants of the more capable levels a greater number of shares. Some of hierarchical secret sharing schemes are known in the way that the secret is shared among a group of participants that is partitioned into levels. We look at hierarchical secret sharing schemes in the purpose of the ease of deleting the secret after it is distributed, that is, the reliability of data deletion depends on the deletion of the shares of the indispensable participants, and focus on providing a fast method and practicality. In this paper, we introduce Fujii et al.'s XOR-based secret sharing scheme and Kurihara et al.'s XOR-based secret sharing scheme, and propose a perfect and ideal ({1,3},n) hierarchical secret sharing scheme based on Fujii et al.'s XOR-based secret sharing scheme for a small number of indispensable participants to place practicality. Our implementation system on a PC with Intel Celeron G1820 2.70GHz and 3.6GB RAM can recover the secret in the processing of around 7.0Gbps.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Hiroshi Doi,et al.  A study on fast hierarchical secret sharing schemes , 2015 .

[3]  Tamir Tassa,et al.  Hierarchical Threshold Secret Sharing , 2004, Journal of Cryptology.

[4]  Amos Beimel,et al.  Secret-Sharing Schemes: A Survey , 2011, IWCC.

[5]  Tomohiko Uyematsu,et al.  A Novel Realization of Threshold Schemes over Binary Field Extensions , 2011, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[6]  Toshiaki Tanaka,et al.  A Fast (3, n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[7]  Toshiaki Tanaka,et al.  A Fast (k, L, n)-Threshold Ramp Secret Sharing Scheme , 2009, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[8]  Toshiaki Tanaka,et al.  On a Fast (k, n)-Threshold Secret Sharing Scheme , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[9]  Y. Fujii,et al.  A fast (2,n)-threshold scheme and its application , 2005 .

[10]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).