Loading…
On Secret Reconstruction in Secret Sharing Schemes
A secret sharing scheme typically requires secure communications in each of two distribution phases: (1) a dealer distributes shares to participants (share distribution phase); and later (2) the participants in some authorised subset send their share information to a combiner (secret reconstruction...
Saved in:
Published in: | IEEE transactions on information theory 2008-01, Vol.54 (1), p.473-480 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c448t-e95005f763e3aa9d603c83494765af24e544bb8c20280b9748fac437098e6d123 |
---|---|
cites | cdi_FETCH-LOGICAL-c448t-e95005f763e3aa9d603c83494765af24e544bb8c20280b9748fac437098e6d123 |
container_end_page | 480 |
container_issue | 1 |
container_start_page | 473 |
container_title | IEEE transactions on information theory |
container_volume | 54 |
creator | Huaxiong Wang Wong, D.S. |
description | A secret sharing scheme typically requires secure communications in each of two distribution phases: (1) a dealer distributes shares to participants (share distribution phase); and later (2) the participants in some authorised subset send their share information to a combiner (secret reconstruction phase). While problems on storage required for participants, for example, the size of shares, have been well studied, problems regarding the communication complexity of the two distribution phases seem to have been mostly neglected in the literature so far. In this correspondence, we deal with several communication related problems in the secret reconstruction phase. Firstly, we show that there is a tradeoff between the communication costs and the number of participants involved in the secret reconstruction. We introduce the communication rate as the ratio of the secret size and the total number of communication bits transmitted from the participants to the combiner in the secret reconstruction phase. We derive a lower bound on the communication rate and give constructions that meet the bound. Secondly, we show that the point-to-point secure communication channels for participants to send share information to the combiner can be replaced with partial broadcast channels. We formulate partial broadcast channels as set systems and show that they are equivalent to the well-known combinatorial objects of cover-free family. Surprisingly, we find that the number of partial broadcast channels can be significantly reduced from the number of point-to-point secure channels. Precisely, in its optimal form, the number of channels can be reduced from n to O(log n), where is the number of participants in a secret sharing scheme. We also study the communication rates of partial broadcast channels for the secret reconstruction. |
doi_str_mv | 10.1109/TIT.2007.911179 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TIT_2007_911179</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4418504</ieee_id><sourcerecordid>1671299421</sourcerecordid><originalsourceid>FETCH-LOGICAL-c448t-e95005f763e3aa9d603c83494765af24e544bb8c20280b9748fac437098e6d123</originalsourceid><addsrcrecordid>eNp9kM1LAzEQxYMoWD_OHrwUQfGyNZNMNpmjiF8gCLaeQxpndaXd1WR78L83UlHw4GkY3u-9YZ4QByAnAJLOZreziZLSTggALG2IERhjK6oNboqRlOAqQnTbYifn17KiATUS6r4bTzkmHsYPHPsuD2kVh7bvxu2PMH0Jqe2ex9P4wkvOe2KrCYvM-99zVzxeXc4ubqq7--vbi_O7KpYzQ8VkpDSNrTXrEOipljo6jYS2NqFRyAZxPndRSeXknCy6JkTUVpLj-gmU3hUn69y31L-vOA9-2ebIi0XouF9lr7E22los4Om_INQWFBEqKOjRH_S1X6WuvOGBDGkwJAt0toZi6nNO3Pi31C5D-vAg_VfXvnTtv7r2666L4_g7NuQYFk0KXWzzr43IOtCucIdrrmXmHxkRnJGoPwEaRYPo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>195931590</pqid></control><display><type>article</type><title>On Secret Reconstruction in Secret Sharing Schemes</title><source>IEEE Xplore (Online service)</source><creator>Huaxiong Wang ; Wong, D.S.</creator><creatorcontrib>Huaxiong Wang ; Wong, D.S.</creatorcontrib><description>A secret sharing scheme typically requires secure communications in each of two distribution phases: (1) a dealer distributes shares to participants (share distribution phase); and later (2) the participants in some authorised subset send their share information to a combiner (secret reconstruction phase). While problems on storage required for participants, for example, the size of shares, have been well studied, problems regarding the communication complexity of the two distribution phases seem to have been mostly neglected in the literature so far. In this correspondence, we deal with several communication related problems in the secret reconstruction phase. Firstly, we show that there is a tradeoff between the communication costs and the number of participants involved in the secret reconstruction. We introduce the communication rate as the ratio of the secret size and the total number of communication bits transmitted from the participants to the combiner in the secret reconstruction phase. We derive a lower bound on the communication rate and give constructions that meet the bound. Secondly, we show that the point-to-point secure communication channels for participants to send share information to the combiner can be replaced with partial broadcast channels. We formulate partial broadcast channels as set systems and show that they are equivalent to the well-known combinatorial objects of cover-free family. Surprisingly, we find that the number of partial broadcast channels can be significantly reduced from the number of point-to-point secure channels. Precisely, in its optimal form, the number of channels can be reduced from n to O(log n), where is the number of participants in a secret sharing scheme. We also study the communication rates of partial broadcast channels for the secret reconstruction.</description><identifier>ISSN: 0018-9448</identifier><identifier>EISSN: 1557-9654</identifier><identifier>DOI: 10.1109/TIT.2007.911179</identifier><identifier>CODEN: IETTAW</identifier><language>eng</language><publisher>New York, NY: IEEE</publisher><subject>Applied sciences ; Australia Council ; Broadcasting ; Channels ; Combinatorial analysis ; Communication channels ; Complexity theory ; Computer science ; Costs ; Cover-free family ; Cryptography ; Equivalence ; Exact sciences and technology ; Information security ; Information sharing ; Information theory ; Information, signal and communications theory ; information-theoretic security ; Lower bounds ; Mathematical problems ; Multicast communication ; Optimization ; Phases ; Physics computing ; Reconstruction ; Secret ; secret sharing ; Signal and communications theory ; Systems, networks and services of telecommunications ; Telecommunications ; Telecommunications and information theory ; Transmission and modulation (techniques and equipments)</subject><ispartof>IEEE transactions on information theory, 2008-01, Vol.54 (1), p.473-480</ispartof><rights>2008 INIST-CNRS</rights><rights>Copyright Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jan 2008</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c448t-e95005f763e3aa9d603c83494765af24e544bb8c20280b9748fac437098e6d123</citedby><cites>FETCH-LOGICAL-c448t-e95005f763e3aa9d603c83494765af24e544bb8c20280b9748fac437098e6d123</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4418504$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,4024,27923,27924,27925,54796</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=19978138$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Huaxiong Wang</creatorcontrib><creatorcontrib>Wong, D.S.</creatorcontrib><title>On Secret Reconstruction in Secret Sharing Schemes</title><title>IEEE transactions on information theory</title><addtitle>TIT</addtitle><description>A secret sharing scheme typically requires secure communications in each of two distribution phases: (1) a dealer distributes shares to participants (share distribution phase); and later (2) the participants in some authorised subset send their share information to a combiner (secret reconstruction phase). While problems on storage required for participants, for example, the size of shares, have been well studied, problems regarding the communication complexity of the two distribution phases seem to have been mostly neglected in the literature so far. In this correspondence, we deal with several communication related problems in the secret reconstruction phase. Firstly, we show that there is a tradeoff between the communication costs and the number of participants involved in the secret reconstruction. We introduce the communication rate as the ratio of the secret size and the total number of communication bits transmitted from the participants to the combiner in the secret reconstruction phase. We derive a lower bound on the communication rate and give constructions that meet the bound. Secondly, we show that the point-to-point secure communication channels for participants to send share information to the combiner can be replaced with partial broadcast channels. We formulate partial broadcast channels as set systems and show that they are equivalent to the well-known combinatorial objects of cover-free family. Surprisingly, we find that the number of partial broadcast channels can be significantly reduced from the number of point-to-point secure channels. Precisely, in its optimal form, the number of channels can be reduced from n to O(log n), where is the number of participants in a secret sharing scheme. We also study the communication rates of partial broadcast channels for the secret reconstruction.</description><subject>Applied sciences</subject><subject>Australia Council</subject><subject>Broadcasting</subject><subject>Channels</subject><subject>Combinatorial analysis</subject><subject>Communication channels</subject><subject>Complexity theory</subject><subject>Computer science</subject><subject>Costs</subject><subject>Cover-free family</subject><subject>Cryptography</subject><subject>Equivalence</subject><subject>Exact sciences and technology</subject><subject>Information security</subject><subject>Information sharing</subject><subject>Information theory</subject><subject>Information, signal and communications theory</subject><subject>information-theoretic security</subject><subject>Lower bounds</subject><subject>Mathematical problems</subject><subject>Multicast communication</subject><subject>Optimization</subject><subject>Phases</subject><subject>Physics computing</subject><subject>Reconstruction</subject><subject>Secret</subject><subject>secret sharing</subject><subject>Signal and communications theory</subject><subject>Systems, networks and services of telecommunications</subject><subject>Telecommunications</subject><subject>Telecommunications and information theory</subject><subject>Transmission and modulation (techniques and equipments)</subject><issn>0018-9448</issn><issn>1557-9654</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2008</creationdate><recordtype>article</recordtype><recordid>eNp9kM1LAzEQxYMoWD_OHrwUQfGyNZNMNpmjiF8gCLaeQxpndaXd1WR78L83UlHw4GkY3u-9YZ4QByAnAJLOZreziZLSTggALG2IERhjK6oNboqRlOAqQnTbYifn17KiATUS6r4bTzkmHsYPHPsuD2kVh7bvxu2PMH0Jqe2ex9P4wkvOe2KrCYvM-99zVzxeXc4ubqq7--vbi_O7KpYzQ8VkpDSNrTXrEOipljo6jYS2NqFRyAZxPndRSeXknCy6JkTUVpLj-gmU3hUn69y31L-vOA9-2ebIi0XouF9lr7E22los4Om_INQWFBEqKOjRH_S1X6WuvOGBDGkwJAt0toZi6nNO3Pi31C5D-vAg_VfXvnTtv7r2666L4_g7NuQYFk0KXWzzr43IOtCucIdrrmXmHxkRnJGoPwEaRYPo</recordid><startdate>200801</startdate><enddate>200801</enddate><creator>Huaxiong Wang</creator><creator>Wong, D.S.</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>200801</creationdate><title>On Secret Reconstruction in Secret Sharing Schemes</title><author>Huaxiong Wang ; Wong, D.S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c448t-e95005f763e3aa9d603c83494765af24e544bb8c20280b9748fac437098e6d123</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Applied sciences</topic><topic>Australia Council</topic><topic>Broadcasting</topic><topic>Channels</topic><topic>Combinatorial analysis</topic><topic>Communication channels</topic><topic>Complexity theory</topic><topic>Computer science</topic><topic>Costs</topic><topic>Cover-free family</topic><topic>Cryptography</topic><topic>Equivalence</topic><topic>Exact sciences and technology</topic><topic>Information security</topic><topic>Information sharing</topic><topic>Information theory</topic><topic>Information, signal and communications theory</topic><topic>information-theoretic security</topic><topic>Lower bounds</topic><topic>Mathematical problems</topic><topic>Multicast communication</topic><topic>Optimization</topic><topic>Phases</topic><topic>Physics computing</topic><topic>Reconstruction</topic><topic>Secret</topic><topic>secret sharing</topic><topic>Signal and communications theory</topic><topic>Systems, networks and services of telecommunications</topic><topic>Telecommunications</topic><topic>Telecommunications and information theory</topic><topic>Transmission and modulation (techniques and equipments)</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Huaxiong Wang</creatorcontrib><creatorcontrib>Wong, D.S.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library Online</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on information theory</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Huaxiong Wang</au><au>Wong, D.S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>On Secret Reconstruction in Secret Sharing Schemes</atitle><jtitle>IEEE transactions on information theory</jtitle><stitle>TIT</stitle><date>2008-01</date><risdate>2008</risdate><volume>54</volume><issue>1</issue><spage>473</spage><epage>480</epage><pages>473-480</pages><issn>0018-9448</issn><eissn>1557-9654</eissn><coden>IETTAW</coden><abstract>A secret sharing scheme typically requires secure communications in each of two distribution phases: (1) a dealer distributes shares to participants (share distribution phase); and later (2) the participants in some authorised subset send their share information to a combiner (secret reconstruction phase). While problems on storage required for participants, for example, the size of shares, have been well studied, problems regarding the communication complexity of the two distribution phases seem to have been mostly neglected in the literature so far. In this correspondence, we deal with several communication related problems in the secret reconstruction phase. Firstly, we show that there is a tradeoff between the communication costs and the number of participants involved in the secret reconstruction. We introduce the communication rate as the ratio of the secret size and the total number of communication bits transmitted from the participants to the combiner in the secret reconstruction phase. We derive a lower bound on the communication rate and give constructions that meet the bound. Secondly, we show that the point-to-point secure communication channels for participants to send share information to the combiner can be replaced with partial broadcast channels. We formulate partial broadcast channels as set systems and show that they are equivalent to the well-known combinatorial objects of cover-free family. Surprisingly, we find that the number of partial broadcast channels can be significantly reduced from the number of point-to-point secure channels. Precisely, in its optimal form, the number of channels can be reduced from n to O(log n), where is the number of participants in a secret sharing scheme. We also study the communication rates of partial broadcast channels for the secret reconstruction.</abstract><cop>New York, NY</cop><pub>IEEE</pub><doi>10.1109/TIT.2007.911179</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0018-9448 |
ispartof | IEEE transactions on information theory, 2008-01, Vol.54 (1), p.473-480 |
issn | 0018-9448 1557-9654 |
language | eng |
recordid | cdi_crossref_primary_10_1109_TIT_2007_911179 |
source | IEEE Xplore (Online service) |
subjects | Applied sciences Australia Council Broadcasting Channels Combinatorial analysis Communication channels Complexity theory Computer science Costs Cover-free family Cryptography Equivalence Exact sciences and technology Information security Information sharing Information theory Information, signal and communications theory information-theoretic security Lower bounds Mathematical problems Multicast communication Optimization Phases Physics computing Reconstruction Secret secret sharing Signal and communications theory Systems, networks and services of telecommunications Telecommunications Telecommunications and information theory Transmission and modulation (techniques and equipments) |
title | On Secret Reconstruction in Secret Sharing Schemes |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-20T14%3A06%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=On%20Secret%20Reconstruction%20in%20Secret%20Sharing%20Schemes&rft.jtitle=IEEE%20transactions%20on%20information%20theory&rft.au=Huaxiong%20Wang&rft.date=2008-01&rft.volume=54&rft.issue=1&rft.spage=473&rft.epage=480&rft.pages=473-480&rft.issn=0018-9448&rft.eissn=1557-9654&rft.coden=IETTAW&rft_id=info:doi/10.1109/TIT.2007.911179&rft_dat=%3Cproquest_cross%3E1671299421%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c448t-e95005f763e3aa9d603c83494765af24e544bb8c20280b9748fac437098e6d123%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=195931590&rft_id=info:pmid/&rft_ieee_id=4418504&rfr_iscdi=true |