Skip to main content

Threshold Secret Sharing Through Multivariate Birkhoff Interpolation

  • Chapter
Computation, Cryptography, and Network Security

Abstract

Secret sharing schemes have been well studied and widely used in different aspects of real life applications. The original secret sharing scheme was proposed by Adi Shamir in 1979. A similar scheme was also invented independently in the same year by George Blakley. Shamir’s scheme is based on Lagrange interpolation while Blakley’s approach uses principles of hyperplane geometry. In 2007, Tamir Tassa proposed a hierarchical secret sharing scheme through univariate Birkhoff interpolation (a generalization of Lagrangian and Hermitian interpolation). In the contribution at hand we investigate the idea of generalizing Tassa’s scheme through multivariate Birkhoff interpolation. We consider the problem of finding secret sharing schemes with multilevel structures and partially ordered sets of levels of participants. In order to ensure that our scheme meets the necessary requirements, we use totally nonsingular matrices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ballico, E., Boato, G., Fontanari, C., Granelli, F.: Hierarchical secret sharing in ad hoc networks through Birkhoff interpolation. In: Elleithy, K., Sobh, T., Mahmood, A., Iskander, M., Karim, M. (eds.) Advances in Computer, Information, and Systems Sciences, and Engineering, pp. 157–164. Springer, Dordrecht (2006)

    Chapter  Google Scholar 

  2. Beimel, A.: Secret-sharing schemes: a survey. Lect. Notes Comput. Sci. 6639, 11–46 (2011)

    Article  MathSciNet  Google Scholar 

  3. Benaloh, J.C., Leichter, J.: Generalized secret sharing and monotone functions. Lect. Notes Comput. Sci. 403, 27–36 (1990)

    Article  MathSciNet  Google Scholar 

  4. Birkhoff, G.D.: General mean value and remainder theorems with applications to mechanical differentiation and quadrature. Trans. Am. Math. Soc. 7, 107–136 (1906)

    Article  MathSciNet  MATH  Google Scholar 

  5. Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of the 1979 AFIPS National Computer Conference, vol. 48, pp. 313–317. AFIPS Press, Montvale, NJ (1979)

    Google Scholar 

  6. Brickel, E.F.: Some ideal secret sharing schemes. J. Combin. Math. Combin. Comput. 6, 105–113 (1989)

    MathSciNet  Google Scholar 

  7. Carnicer, J.M.: Interpolation shape control and shape properties. In: Peña, J.M. (ed.) Shape Preserving Representations in Computer-Aided Geometric Design, Chapter 2, pp. 15–43. Nova Science Publishers, Commack, NY (1999)

    Google Scholar 

  8. Crainic, M., Crainic, N.: Pólya conditions for multivariate Birkhoff interpolation: from general to rectangular sets of nodes. Acta Math. Univ. Comenianae 79(1), 9–18 (2010)

    MathSciNet  MATH  Google Scholar 

  9. Demmel, J., Koev, P.: The accurate and efficient solution of a totally positive generalized Vandermonde linear system. SIAM J. Matrix Anal. Appl. 27(1), 142–152 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  10. Desmedt, Y., Frankel, Y.: Shared generation of authenticators and signatures. Lect. Notes Comput. Sci. 576, 457–469 (1992)

    Article  Google Scholar 

  11. Farràs, O., Padró, C.: Ideal hierarchical secret sharing schemes. Lect. Notes Comput. Sci. 5978, 219–236 (2010)

    Article  Google Scholar 

  12. Farràs, O., Padró, C.: Ideal hierarchical secret sharing schemes. IEEE Trans. Inform. Theory 58(5), 3273–3286 (2012)

    Article  MathSciNet  Google Scholar 

  13. Hei, X.-L., Du, X.-J., Song, B.-H.: Two matrices for Blakley’s secret sharing scheme. In: Proceedings of the 2012 IEEE International Conference on Communications (ICC), pp. 810–814. IEEE (2012)

    Google Scholar 

  14. Lorentz, R.A.: Multivariate Birkhoff Interpolation. Lecture Notes in Mathematics Series, vol. 1516. Springer, Berlin/Heidelberg (1992)

    Google Scholar 

  15. Lorentz, G.G., Jetter, K., Riemenschneider, S.D.: Birkhoff Interpolation. Encyclopedia of Mathematics and Its Applications, vol. 19. Addison-Wesley, Reading (1982)

    Google Scholar 

  16. Peña, J.M.: Stability and error analysis of shape preserving representations. In: Peña, J.M. (ed.) Shape Preserving Representations in Computer-aided Geometric Design, Chapter 5, pp. 85–97. Nova Science Publishers, Commack, NY (1999)

    Google Scholar 

  17. Pólya, G.: Bemerkung zur Interpolation und zur Naherungstheorie der Balkenbiegung. Z. Angew. Math. Mech. 11, 445–449 (1931)

    Article  Google Scholar 

  18. Rouillier, F., El Din, M.S., Schost, E.: Solving the Birkhoff interpolation problem via the critical point method. Lect. Notes Artif. Intell. 2061, 26–40 (2001)

    Google Scholar 

  19. Schoenberg, I.J.: On Hermite-Birkhoff interpolation. J. Math. Anal. Appl. 16, 538–543 (1966)

    Article  MathSciNet  MATH  Google Scholar 

  20. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  21. Stinson, D.R.: An explication of secret sharing schemes. Designs Codes Cryptogr. 2(4), 357–390 (1992)

    Article  MathSciNet  MATH  Google Scholar 

  22. Tassa, T.: Hierarchical threshold secret sharing. J. Cryptol. 20(2), 237–264 (2007)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vasileios E. Markoutis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Markoutis, V.E., Meletiou, G.C., Veneti, A.N., Vrahatis, M.N. (2015). Threshold Secret Sharing Through Multivariate Birkhoff Interpolation. In: Daras, N., Rassias, M. (eds) Computation, Cryptography, and Network Security. Springer, Cham. https://doi.org/10.1007/978-3-319-18275-9_14

Download citation

Publish with us

Policies and ethics