DocumentCode :
2270870
Title :
Strongly secure ramp secret sharing schemes
Author :
Iwamoto, Mitsugu ; Yamamoto, Hirosuke
Author_Institution :
Graduate Sch. of Inf. Syst., Univ. of Electro-Commun., Chofu
fYear :
2005
fDate :
4-9 Sept. 2005
Firstpage :
1221
Lastpage :
1225
Abstract :
Ramp secret sharing (SS) schemes can be classified into strong ramp SS schemes and weak ramp SS schemes. The strong ramp SS schemes do not leak out any part of a secret explicitly even in the case where some information about the secret leaks from a non-qualified set of shares, and hence, they are more desirable than weak ramp SS schemes. However, it is not known how to construct the strong ramp SS schemes in the case of general access structures. In this paper, it is shown that a strong ramp SS scheme can always be constructed from a SS scheme with plural secrets for any feasible general access structure. As a byproduct, it is pointed out that threshold ramp SS schemes based on Shamir´s polynomial interpolation method are not always strong
Keywords :
cryptography; interpolation; polynomial approximation; Shamir polynomial interpolation method; general access structure; nonqualified share set; plural secrets; ramp secret sharing schemes; strong ramp SS schemes; strongly secure sharing schemes; threshold ramp SS schemes; weak ramp SS schemes; Cryptography; Data security; Electronic mail; Entropy; Information security; Information systems; Interpolation; Polynomials;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory, 2005. ISIT 2005. Proceedings. International Symposium on
Conference_Location :
Adelaide, SA
Print_ISBN :
0-7803-9151-9
Type :
conf
DOI :
10.1109/ISIT.2005.1523536
Filename :
1523536
Link To Document :
بازگشت