A (t,n) multi-secret sharing scheme

Chou Chen Yang, Ting Yi Chang, Min Shiang Hwang

Research output: Contribution to journalArticle

154 Citations (Scopus)

Abstract

In the (t,n) multi-secret sharing scheme, there are n participants in the system. At least t or more participants can easily pool their secrets shadows and reconstruct p secrets at the same time. Chien et al. [IEICE Trans. Fundamentals E83-A (2000) 2762] used (n+p-t+1) public values, (2(n+p)-t)×(n+p) storages, and solved (n+p-t) simultaneous equations to share p secrets. In this article, we shall propose an alternative (t,n) multi-secret sharing based on Shamir's secret sharing. We shall use (n+p-t+1) or (n+1) public values, 2(t-1) or 2(p-1) storages, and employ the Lagrange interpolation polynomial to share p secrets. Our scheme will have exactly the same power as Chien et al.'s scheme.

Original languageEnglish
Pages (from-to)483-490
Number of pages8
JournalApplied Mathematics and Computation
Volume151
Issue number2
DOIs
Publication statusPublished - 2004 Apr 5

Fingerprint

Secret Sharing Scheme
Secret Sharing
Interpolation
Polynomials
Simultaneous equations
Lagrange Interpolation
Polynomial
Alternatives

All Science Journal Classification (ASJC) codes

  • Computational Mathematics
  • Applied Mathematics

Cite this

Yang, Chou Chen ; Chang, Ting Yi ; Hwang, Min Shiang. / A (t,n) multi-secret sharing scheme. In: Applied Mathematics and Computation. 2004 ; Vol. 151, No. 2. pp. 483-490.
@article{04a70fc305464ba39c96ba2d465a2cc2,
title = "A (t,n) multi-secret sharing scheme",
abstract = "In the (t,n) multi-secret sharing scheme, there are n participants in the system. At least t or more participants can easily pool their secrets shadows and reconstruct p secrets at the same time. Chien et al. [IEICE Trans. Fundamentals E83-A (2000) 2762] used (n+p-t+1) public values, (2(n+p)-t)×(n+p) storages, and solved (n+p-t) simultaneous equations to share p secrets. In this article, we shall propose an alternative (t,n) multi-secret sharing based on Shamir's secret sharing. We shall use (n+p-t+1) or (n+1) public values, 2(t-1) or 2(p-1) storages, and employ the Lagrange interpolation polynomial to share p secrets. Our scheme will have exactly the same power as Chien et al.'s scheme.",
author = "Yang, {Chou Chen} and Chang, {Ting Yi} and Hwang, {Min Shiang}",
year = "2004",
month = "4",
day = "5",
doi = "10.1016/S0096-3003(03)00355-2",
language = "English",
volume = "151",
pages = "483--490",
journal = "Applied Mathematics and Computation",
issn = "0096-3003",
publisher = "Elsevier Inc.",
number = "2",

}

A (t,n) multi-secret sharing scheme. / Yang, Chou Chen; Chang, Ting Yi; Hwang, Min Shiang.

In: Applied Mathematics and Computation, Vol. 151, No. 2, 05.04.2004, p. 483-490.

Research output: Contribution to journalArticle

TY - JOUR

T1 - A (t,n) multi-secret sharing scheme

AU - Yang, Chou Chen

AU - Chang, Ting Yi

AU - Hwang, Min Shiang

PY - 2004/4/5

Y1 - 2004/4/5

N2 - In the (t,n) multi-secret sharing scheme, there are n participants in the system. At least t or more participants can easily pool their secrets shadows and reconstruct p secrets at the same time. Chien et al. [IEICE Trans. Fundamentals E83-A (2000) 2762] used (n+p-t+1) public values, (2(n+p)-t)×(n+p) storages, and solved (n+p-t) simultaneous equations to share p secrets. In this article, we shall propose an alternative (t,n) multi-secret sharing based on Shamir's secret sharing. We shall use (n+p-t+1) or (n+1) public values, 2(t-1) or 2(p-1) storages, and employ the Lagrange interpolation polynomial to share p secrets. Our scheme will have exactly the same power as Chien et al.'s scheme.

AB - In the (t,n) multi-secret sharing scheme, there are n participants in the system. At least t or more participants can easily pool their secrets shadows and reconstruct p secrets at the same time. Chien et al. [IEICE Trans. Fundamentals E83-A (2000) 2762] used (n+p-t+1) public values, (2(n+p)-t)×(n+p) storages, and solved (n+p-t) simultaneous equations to share p secrets. In this article, we shall propose an alternative (t,n) multi-secret sharing based on Shamir's secret sharing. We shall use (n+p-t+1) or (n+1) public values, 2(t-1) or 2(p-1) storages, and employ the Lagrange interpolation polynomial to share p secrets. Our scheme will have exactly the same power as Chien et al.'s scheme.

UR - http://www.scopus.com/inward/record.url?scp=1542402281&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=1542402281&partnerID=8YFLogxK

U2 - 10.1016/S0096-3003(03)00355-2

DO - 10.1016/S0096-3003(03)00355-2

M3 - Article

AN - SCOPUS:1542402281

VL - 151

SP - 483

EP - 490

JO - Applied Mathematics and Computation

JF - Applied Mathematics and Computation

SN - 0096-3003

IS - 2

ER -