Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2004.11C.5.563

A κ-Span Secret Sharing Schem with Exposing Forged Shadows  

Park, Taek-Jin (강릉영동대학 전자정보과)
Won, Dong-Ho (성균관대학교 정보통신공학부)
Abstract
In the secret sharing scheme, the reconstruction secret must to exposed to participants. In order to enforce the same secret sharing schemes, a new secret have to regenerate and redistribute for participants. Such a regeneration process is inefficient because of the overhead in the regeneration. In this paper, we proposed efficient secret regeneration scheme by eigenvalue. it can be also redistribution without revealing with other participants.
Keywords
$\kappa$-Span Secret Sharing Scheme; Forged Shadow; Regeneration; Master Key; Eigenvalue;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Ernest F. Brickell, Some Ideal Secret Sharing Schemes, Proc. Crypto '88, Springer-Verlag, pp.468-475
2 Ernest F. Brickell and Daniel M. Davenport, On the Classification of Ideal Secret Sharing Schemes, Proc. Crypto '88, Springer-Verlag, pp.279-285
3 Benaloh, j. and J. Leichter, generalized Secret Sharing and Monotone Functions, Advances in Cryptography - Crypto '86, A. M. Odlyzko (ed.), Springer-Verlag, Lecture Notes in Computer Science, Vol.236, pp.213-222, 1987
4 S. C. Kothari, 'Generalized Linear Threshold Scheme,' in Proc Cryto '86, Springer-Verlag, pp.231-241
5 Mathematica lCryptology for Computer Scientists and Mathematicians, WAYNE PATTERSON, ROWMAN & LITTLEFIELD Pubilshers
6 W. Diffie and M. E. Hellman, 'New Directions In Cryptography,' IEEE Transaction on Information Theory, Vol.IT-22, pp.644-65, 1976   DOI
7 C. Asmuth and J. Bloom, 'A Modular Approach To Key Safeguarding,' IEEE Transaction on Information Theory, Vol.IT-29, No.2, pp.208-210, March, 1983   DOI
8 M. Tompa and H. Woll, 'How To Share A Secret With Cheaters,' Crypto '86 pp.261-265
9 Lee W., Johnson R., Dean Riess Jimmy T., Arnold, 'Introduction to Linear Algebra,' Addison-Wesley. Inc. 1993
10 L. Harn and Hung-Yu Lin, 'A ${\ell$}-Span Generalized Secret Sharing Scheme,' Proc. Crypto '92, Springer-Verlag, pp.558-565
11 A, shmir, 'How to Share a Secret,' communication ACM, Vol.22, No.11, pp.612-613, Nov., 1979   DOI   ScienceOn
12 C. S. Laih, M. D. Lin and T. Hwang, 'A new threshold scheme with detecting and exposing forged shadows,' ISITA '90, pp.1053-1056, November, 1990
13 C. S. Laih, L. Harn, J. Y. Lee and T. Hwang, 'Dynamic Threshold Scheme Based on the Definition of Cross-product in an N-Dimensional Linear Space,' Proc. Crypto '87, Springer-Verlag, pp.286-279
14 G. R. Blakley, 'Safeguarding Cryptographic keys,' in Proc. Amer. Fed. Inform. Proc. Soc. NCC, vol.48, pp.313-317, June, 1977