By Topic

Ideal and perfect multi-secret sharing schemes whose access structure are Q3

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Lv yingli ; Department of Electrical engineering, Hebei Institute of Architecture Civil Engineering, Zhangjiakou 075024, China ; Xu Xiaojun ; Zhang Xiaofeng ; Zhang Lianlian

The characterization of access structure is one of the main open problems in secret sharing schemes. We are particularly interested in determining which Q3 access structures can be realized and the requirement should be achieved even in the presence of an adversary who is able to corrupt some players in an ideal secret sharing scheme. The problems are studied in our paper. Above all, we present a concrete scheme that can meet all above requirements. In our scheme, it is not only a dynamic multi-secret and multi-use sharing protocol, but participants from access structure can recover the secret using their shares, while the same number of participants from adversary structure can't recover the secret using their shares, which is different from general access structure schemes. Moreover, in the whole dynamic process, the coefficients of polynomial and private secret shares always stay the same. Therefore, it enjoys high practical value.

Published in:

Computing and Networking Technology (ICCNT), 2012 8th International Conference on

Date of Conference:

27-29 Aug. 2012