Key distribution and recovery algorithm based on Shamir's secret sharing

In Shamir's secret sharing scheme, the dealer divided the secret s into n shadows and distributed it to share-holders in such a way that any t or more than t shadows can recover this secret, while fewer than t shadows cannot obtain any information about the secret s. During the actual secret re...

Full description

Saved in:
Bibliographic Details
Main Authors: Hui-gui RONG, Jin-xia MO, Bing-guo CHANG, Guang SUN, Fei LONG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2015-03-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015083/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539644112502784
author Hui-gui RONG
Jin-xia MO
Bing-guo CHANG
Guang SUN
Fei LONG
author_facet Hui-gui RONG
Jin-xia MO
Bing-guo CHANG
Guang SUN
Fei LONG
author_sort Hui-gui RONG
collection DOAJ
description In Shamir's secret sharing scheme, the dealer divided the secret s into n shadows and distributed it to share-holders in such a way that any t or more than t shadows can recover this secret, while fewer than t shadows cannot obtain any information about the secret s. During the actual secret recovery process, there exist other cases with more than t par-ticipants. The case of secret sharing problem was discussed based on Shamir's secret sharing scheme and reconstructs the secret by introducing a linear combination of shadows—Lagrange factor. Then, the improved algorithm of key distribu-tion and recovery was proposed and extended to a multi-secret sharing scheme. Theoretical analysis and simulation show that the improved scheme improves its security under the same conditions of complexity.
format Article
id doaj-art-3d57be8277984b9783fae6133a5f8355
institution Kabale University
issn 1000-436X
language zho
publishDate 2015-03-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-3d57be8277984b9783fae6133a5f83552025-01-14T06:45:51ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2015-03-013626527459691346Key distribution and recovery algorithm based on Shamir's secret sharingHui-gui RONGJin-xia MOBing-guo CHANGGuang SUNFei LONGIn Shamir's secret sharing scheme, the dealer divided the secret s into n shadows and distributed it to share-holders in such a way that any t or more than t shadows can recover this secret, while fewer than t shadows cannot obtain any information about the secret s. During the actual secret recovery process, there exist other cases with more than t par-ticipants. The case of secret sharing problem was discussed based on Shamir's secret sharing scheme and reconstructs the secret by introducing a linear combination of shadows—Lagrange factor. Then, the improved algorithm of key distribu-tion and recovery was proposed and extended to a multi-secret sharing scheme. Theoretical analysis and simulation show that the improved scheme improves its security under the same conditions of complexity.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015083/secret sharingkey distributionLagrange factorkey recovery
spellingShingle Hui-gui RONG
Jin-xia MO
Bing-guo CHANG
Guang SUN
Fei LONG
Key distribution and recovery algorithm based on Shamir's secret sharing
Tongxin xuebao
secret sharing
key distribution
Lagrange factor
key recovery
title Key distribution and recovery algorithm based on Shamir's secret sharing
title_full Key distribution and recovery algorithm based on Shamir's secret sharing
title_fullStr Key distribution and recovery algorithm based on Shamir's secret sharing
title_full_unstemmed Key distribution and recovery algorithm based on Shamir's secret sharing
title_short Key distribution and recovery algorithm based on Shamir's secret sharing
title_sort key distribution and recovery algorithm based on shamir s secret sharing
topic secret sharing
key distribution
Lagrange factor
key recovery
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015083/
work_keys_str_mv AT huiguirong keydistributionandrecoveryalgorithmbasedonshamirssecretsharing
AT jinxiamo keydistributionandrecoveryalgorithmbasedonshamirssecretsharing
AT bingguochang keydistributionandrecoveryalgorithmbasedonshamirssecretsharing
AT guangsun keydistributionandrecoveryalgorithmbasedonshamirssecretsharing
AT feilong keydistributionandrecoveryalgorithmbasedonshamirssecretsharing