2016
DOI: 10.1007/978-3-319-48965-0_28
|View full text |Cite
|
Sign up to set email alerts
|

Efficient, XOR-Based, Ideal $$(t,n)-$$threshold Schemes

Abstract: Abstract. We propose a new, lightweight (t, n)−threshold secret sharing scheme that can be implemented using only XOR operations. Our scheme is based on an idea extracted from a patent application by Hewlett Packard that utilises error correction codes. Our scheme improves on the patent by requiring fewer randomly generated bits and by reducing the size of shares given to each player, thereby making the scheme ideal. We provide a security proof and efficiency analysis. We compare our scheme to existing schemes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…More specifically, we measure performance that shows the latter is more efficient in distribution if n, or p, is not large, where k ≥ 3. Here, several approaches [13], [14], [15], [16] to discussing the connection to Shamir's scheme have been reported, but no discussion has been provided on the connection between XOR-based secret sharing schemes and the properties of circulant matrices. Recent researches [17], [18] also proposed XOR-based related approaches.…”
Section: Our Contributionsmentioning
confidence: 99%
“…More specifically, we measure performance that shows the latter is more efficient in distribution if n, or p, is not large, where k ≥ 3. Here, several approaches [13], [14], [15], [16] to discussing the connection to Shamir's scheme have been reported, but no discussion has been provided on the connection between XOR-based secret sharing schemes and the properties of circulant matrices. Recent researches [17], [18] also proposed XOR-based related approaches.…”
Section: Our Contributionsmentioning
confidence: 99%
“…Thus, in case of authority revocation, 1 4 of the data needs to be re-encrypted, which reduces the computation overhead. 7) IDA-XOR 2016 [31]: This variant is based on "error code correction". It is a lightweight IDA, without using general RS codes, combining the generation of random bits with the systematic IDA.…”
Section: B Rabin Information Dispersal Algorithm Ida [20]mentioning
confidence: 99%
“…The scheme features polynomials within a finite field and restores keys between polynomials via Lagrangian interpolation. Other secret sharing techniques feature different polynomials, or the use of various mathematical principles such as Exclusive-OR (XOR) [ 12 , 13 , 14 ], Chinese remainder theorem (CRT) [ 15 , 16 ], or hash functions [ 17 , 18 ].…”
Section: Related Workmentioning
confidence: 99%