Ideal Hierarchical (t;n) Secret Sharing Schemes

A secret sharing scheme divides a secret into multiple shares by a dealer and shared among shareholders in such a way that any authorized subset of shareholders can reconstruct the secret; whereas any un-authorized subset of shareholders cannot recover the secret. If the maximal length of shares is equal to the length of the secret in a secret sharing scheme, the scheme is called ideal. If the shares corresponding to each un-authorized subset provide absolutely no information, in the information-theoretic sense, the scheme is called perfect. Shamir proposed the flrst (t;n) threshold secret sharing scheme and it is ideal and perfect. In this paper, we propose two modiflcations of Shamir’s secret sharing scheme. In our flrst modiflcation, each shareholder keeps both x-coordinate and y-coordinate of a polynomial as private share. In our second modiflcation, dealer uses polynomial with degree larger than the threshold value t to generate shares for a (t;n) threshold scheme. We show that these

[1]  Ernest F. Brickell,et al.  On the classification of ideal secret sharing schemes , 1989, Journal of Cryptology.

[2]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[3]  Carles Padró,et al.  Ideal Multipartite Secret Sharing Schemes , 2007, Journal of Cryptology.

[4]  Fabrizio Granelli,et al.  Hierarchical secret sharing in ad hoc networks through Birkhoff interpolation , 2007 .

[5]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[6]  Rui Cheng,et al.  Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks , 2007, Inscrypt.

[7]  Ehud D. Karnin,et al.  On secret sharing systems , 1983, IEEE Trans. Inf. Theory.

[8]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[9]  Gustavus J. Simmons,et al.  How to (Really) Share a Secret , 1988, CRYPTO.

[10]  Tamir Tassa Hierarchical Threshold Secret Sharing , 2004, TCC.

[11]  Nira Dyn,et al.  Multipartite Secret Sharing by Bivariate Interpolation , 2008, Journal of Cryptology.

[12]  Zhuojun Liu,et al.  Sure Interpolation and Its Application to Hierarchical Threshold Secret Sharing Scheme , 2008, 2008 International Symposium on Computer Science and Computational Technology.

[13]  Ernest F. Brickell,et al.  Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.

[14]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[15]  Josef Pieprzyk,et al.  Secret Sharing in Multilevel and Compartmented Groups , 1998, ACISP.