Abstract

We propose a verifiable [Formula: see text]-threshold secret sharing scheme using Lagrange interpolation and secure cryptographic hash functions. This scheme is an improvement of Shao’s scheme [Inform. Sci. 278 (2014) 104–109]. In our variant, verification of shares is achieved through computation of their multiplicative inverses in conjunction with a secure hash function such as SHA-3. This idea results in a significant size reduction, in comparison with Shao’s scheme, to the shares assigned to each participant. Applications of the proposed scheme include sharing of cryptographic keys, access codes, etc. Furthermore, we improve our construction to present a method for secret sharing with adjustable access structure. This can further be extended to a secret sharing scheme with essential participants, where any authorized set of participants must meet a threshold in the number of essential participants it contains. While our proposal has smaller share sizes compared to Shao’s scheme, it also adds the capabilities of changeable parameters and essential participants.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.