Secret Sharing Scheme Suitable for Cloud Computing

Secret sharing schemes have recently been considered to apply for cloud computing in which many users distribute multiple data to servers. However, when Shamir's (k, n) secret sharing is applied to cloud systems, the amount of share increases more than n times the amount of the secret. Therefore, in this paper we propose a new secret sharing scheme that can reduce the amount of share different from Ramp type secret sharing, suitable for cloud systems, and we prove that it is computationally secure.

[1]  Markus Stadler,et al.  Publicly Verifiable Secret Sharing , 1996, EUROCRYPT.

[2]  Joseph Y. Halpern,et al.  Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.

[3]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[4]  Li Bai,et al.  A strong ramp secret sharing scheme using matrix projection , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[5]  Hugo Krawczyk,et al.  Secret Sharing Made Short , 1994, CRYPTO.

[6]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[7]  Christophe Tartary,et al.  Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes , 2008, CANS.

[8]  Alfredo De Santis,et al.  Fully Dynamic Secret Sharing Schemes , 1993, Theor. Comput. Sci..

[9]  Ching-Nung Yang,et al.  New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..

[10]  Catherine A. Meadows,et al.  Security of Ramp Schemes , 1985, CRYPTO.

[11]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[12]  Keith M. Martin,et al.  A combinatorial interpretation of ramp schemes , 1996, Australas. J Comb..

[13]  L. Harn Efficient sharing (broadcasting) of multiple secrets , 1995 .

[14]  Tamir Tassa Hierarchical Threshold Secret Sharing , 2004, TCC.

[15]  Hong Zhong,et al.  A Secret Sharing Scheme with the Changeable Threshold Value , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.

[16]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[17]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[18]  Yeow Meng Chee,et al.  Threshold changeable secret sharing schemes revisited , 2012, Theor. Comput. Sci..

[19]  Kaoru Kurosawa,et al.  Nonperfect Secret Sharing Schemes and Matroids , 1994, EUROCRYPT.

[20]  Hirosuke Yamamoto,et al.  (k,L,n)Ramp Secret Sharing Systems for Functions , 2001 .