Sequential (t,n) multi secret sharing scheme for level-ordered access structure

A new access structure called the Level ordered Access Structure (LoAS) is introduced in Pattipati et al. (IJ Netw Secur 18(5):874–881, 2016) and proposed a sequential secret sharing scheme that realises this access structure. This is similar to multilevel access structure but enforces ordering among levels while reconstructing the secret. In this paper, we extended a secret sharing scheme for multiple secrets to realise LoAS. The construction uses public key primitives with Lagrange interpolation. In this scheme, multiple secrets are distributed one each among the levels. The scheme uses the concepts of quadratic residues and discrete logarithm problem. Reconstruction of the secrets is such that participants of different levels find their respective level secrets only after they get their immediate higher level permission. The novelty of the scheme is that, it achieves ordering concept. Performance and security analysis of the scheme is also discussed.

[1]  Lein Harn,et al.  Ideal Hierarchical (t;n) Secret Sharing Schemes , 2009 .

[2]  V. Ch. Venkaiah,et al.  New secret sharing scheme for multipartite access structures with threshold changeability , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[3]  V. Ch. Venkaiah,et al.  Multi-Stage Multi-Secret Sharing Schemes Based on Chinese Remainder Theorem , 2015, ICARCSET '15.

[4]  Samaneh Mashhadi How to Fairly Share Multiple Secrets Stage by Stage , 2016, Wirel. Pers. Commun..

[5]  Lein Harn,et al.  Multilevel threshold secret sharing based on the Chinese Remainder Theorem , 2014, Inf. Process. Lett..

[6]  Min-Shiang Hwang,et al.  A (t, n) multi-secret sharing scheme , 2004, Appl. Math. Comput..

[7]  Tamir Tassa,et al.  Hierarchical Threshold Secret Sharing , 2004, Journal of Cryptology.

[8]  Nira Dyn,et al.  Multipartite Secret Sharing by Bivariate Interpolation , 2008, Journal of Cryptology.

[9]  Douglas R. Stinson,et al.  Sequential Secret Sharing as a New Hierarchical Access Structure , 2015, J. Internet Serv. Inf. Secur..

[10]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[11]  V. Ch. Venkaiah,et al.  Multi-stage multi-secret sharing scheme for hierarchical access structure , 2017, 2017 International Conference on Computing, Communication and Automation (ICCCA).

[12]  Chakravarthy Bhagvati,et al.  CRT Based Threshold Multi Secret Sharing Scheme , 2014, Int. J. Netw. Secur..

[13]  Rong Zhao,et al.  A practical verifiable multi-secret sharing scheme , 2007, Comput. Stand. Interfaces.

[14]  Josef Pieprzyk,et al.  Secret Sharing in Multilevel and Compartmented Groups , 1998, ACISP.

[15]  L. Harn,et al.  Comment on "Multistage secret sharing based on one-way function" , 1995 .

[16]  Nidhi Singh,et al.  Sequential secret sharing scheme based on Chinese remainder theorem , 2016 .

[17]  Wei-Pang Yang,et al.  A new multi-stage secret sharing scheme using one-way function , 2005, OPSR.

[18]  V. Ch. Venkaiah,et al.  Sequential Secret Sharing Scheme Based on Level Ordered Access Structure , 2016, Int. J. Netw. Secur..

[19]  Prabal Paul,et al.  Computationally perfect compartmented secret sharing schemes based on MDS codes , 2014, Int. J. Trust. Manag. Comput. Commun..

[20]  V. Ch. Venkaiah,et al.  Multi-secret Sharing Scheme for Level-Ordered Access Structures , 2017, NuTMiC.

[21]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[22]  Ed Dawson,et al.  Multistage secret sharing based on one-way function , 1994 .

[23]  Keith M. Martin,et al.  On Sharing Many Secrets (Extended Abstract) , 1994, ASIACRYPT.

[24]  Gustavus J. Simmons,et al.  How to (Really) Share a Secret , 1988, CRYPTO.