Two matrices for Blakley's secret sharing scheme

The secret sharing scheme was invented by Adi Shamir and George Blakley independently in 1979. In a (k, n)-threshold linear secret sharing scheme, any k-out-of-n participants could recover the shared secret, and any less than k participants could not recover the secret. Shamir's secret sharing scheme is more popular than Blakley's even though the former is more complex than the latter. The reason is that Blakley's scheme lacks determined, general and suitable matrices. In this paper, we present two matrices that can be used for Blakley's secret sharing system. Compared with the Vandermonde matrix used by Shamir's scheme, the elements in these matrices increase slowly. Furthermore, we formulate the optimal matrix problem and find the lower bound of the minimal maximized element for k=2 and upper bound of the minimal maximized element of matrix for given k.

[1]  Gustavus J. Simmons,et al.  Contemporary Cryptology: The Science of Information Integrity , 1994 .

[2]  Xiaojiang Du,et al.  A distributed login framework for semi-structured Peer-to-Peer networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[3]  Ali Aydin Selçuk,et al.  Practical Threshold Signatures with Linear Secret Sharing Schemes , 2009, AFRICACRYPT.

[4]  G. R. Blakley,et al.  Linear Algebra Approach to Secret Sharing Schemes , 1993, Error Control, Cryptology, and Speech Compression.

[5]  Ehud D. Karnin,et al.  On secret sharing systems , 1983, IEEE Trans. Inf. Theory.

[6]  John Bloom,et al.  A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.

[7]  Kamer Kaya,et al.  Threshold Cryptography Based on Blakley Secret Sharing , 2008 .

[8]  Hao-Kuan Tso Sharing secret images using Blakley's concept , 2008 .

[9]  Chien-Chang Chen,et al.  A Geometry-Based Secret Image Sharing Approach , 2008, J. Inf. Sci. Eng..

[10]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[11]  Vasif V. Nabiyev,et al.  Improvements in Geometry-Based Secret Image Sharing Approach with Steganography , 2009 .

[12]  Adi Shamir,et al.  How to share a secret , 1979, CACM.