Abstract
Secret sharing schemes have been well studied and widely used in different aspects of real life applications. The original secret sharing scheme was proposed by Adi Shamir in 1979. A similar scheme was also invented independently in the same year by George Blakley. Shamir’s scheme is based on Lagrange interpolation while Blakley’s approach uses principles of hyperplane geometry. In 2007, Tamir Tassa proposed a hierarchical secret sharing scheme through univariate Birkhoff interpolation (a generalization of Lagrangian and Hermitian interpolation). In the contribution at hand we investigate the idea of generalizing Tassa’s scheme through multivariate Birkhoff interpolation. We consider the problem of finding secret sharing schemes with multilevel structures and partially ordered sets of levels of participants. In order to ensure that our scheme meets the necessary requirements, we use totally nonsingular matrices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ballico, E., Boato, G., Fontanari, C., Granelli, F.: Hierarchical secret sharing in ad hoc networks through Birkhoff interpolation. In: Elleithy, K., Sobh, T., Mahmood, A., Iskander, M., Karim, M. (eds.) Advances in Computer, Information, and Systems Sciences, and Engineering, pp. 157–164. Springer, Dordrecht (2006)
Beimel, A.: Secret-sharing schemes: a survey. Lect. Notes Comput. Sci. 6639, 11–46 (2011)
Benaloh, J.C., Leichter, J.: Generalized secret sharing and monotone functions. Lect. Notes Comput. Sci. 403, 27–36 (1990)
Birkhoff, G.D.: General mean value and remainder theorems with applications to mechanical differentiation and quadrature. Trans. Am. Math. Soc. 7, 107–136 (1906)
Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of the 1979 AFIPS National Computer Conference, vol. 48, pp. 313–317. AFIPS Press, Montvale, NJ (1979)
Brickel, E.F.: Some ideal secret sharing schemes. J. Combin. Math. Combin. Comput. 6, 105–113 (1989)
Carnicer, J.M.: Interpolation shape control and shape properties. In: Peña, J.M. (ed.) Shape Preserving Representations in Computer-Aided Geometric Design, Chapter 2, pp. 15–43. Nova Science Publishers, Commack, NY (1999)
Crainic, M., Crainic, N.: Pólya conditions for multivariate Birkhoff interpolation: from general to rectangular sets of nodes. Acta Math. Univ. Comenianae 79(1), 9–18 (2010)
Demmel, J., Koev, P.: The accurate and efficient solution of a totally positive generalized Vandermonde linear system. SIAM J. Matrix Anal. Appl. 27(1), 142–152 (2005)
Desmedt, Y., Frankel, Y.: Shared generation of authenticators and signatures. Lect. Notes Comput. Sci. 576, 457–469 (1992)
Farràs, O., Padró, C.: Ideal hierarchical secret sharing schemes. Lect. Notes Comput. Sci. 5978, 219–236 (2010)
Farràs, O., Padró, C.: Ideal hierarchical secret sharing schemes. IEEE Trans. Inform. Theory 58(5), 3273–3286 (2012)
Hei, X.-L., Du, X.-J., Song, B.-H.: Two matrices for Blakley’s secret sharing scheme. In: Proceedings of the 2012 IEEE International Conference on Communications (ICC), pp. 810–814. IEEE (2012)
Lorentz, R.A.: Multivariate Birkhoff Interpolation. Lecture Notes in Mathematics Series, vol. 1516. Springer, Berlin/Heidelberg (1992)
Lorentz, G.G., Jetter, K., Riemenschneider, S.D.: Birkhoff Interpolation. Encyclopedia of Mathematics and Its Applications, vol. 19. Addison-Wesley, Reading (1982)
Peña, J.M.: Stability and error analysis of shape preserving representations. In: Peña, J.M. (ed.) Shape Preserving Representations in Computer-aided Geometric Design, Chapter 5, pp. 85–97. Nova Science Publishers, Commack, NY (1999)
Pólya, G.: Bemerkung zur Interpolation und zur Naherungstheorie der Balkenbiegung. Z. Angew. Math. Mech. 11, 445–449 (1931)
Rouillier, F., El Din, M.S., Schost, E.: Solving the Birkhoff interpolation problem via the critical point method. Lect. Notes Artif. Intell. 2061, 26–40 (2001)
Schoenberg, I.J.: On Hermite-Birkhoff interpolation. J. Math. Anal. Appl. 16, 538–543 (1966)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Stinson, D.R.: An explication of secret sharing schemes. Designs Codes Cryptogr. 2(4), 357–390 (1992)
Tassa, T.: Hierarchical threshold secret sharing. J. Cryptol. 20(2), 237–264 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Markoutis, V.E., Meletiou, G.C., Veneti, A.N., Vrahatis, M.N. (2015). Threshold Secret Sharing Through Multivariate Birkhoff Interpolation. In: Daras, N., Rassias, M. (eds) Computation, Cryptography, and Network Security. Springer, Cham. https://doi.org/10.1007/978-3-319-18275-9_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-18275-9_14
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18274-2
Online ISBN: 978-3-319-18275-9
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)