Skip to main content
Log in

A Construction for Multisecret Threshold Schemes

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

A multisecret threshold scheme is a system that protects a number of secrets (or keys) among a group of participants, as follows. Given a set of n participants, there is a secret s K associated with each k–subset K of these participants. The scheme ensures that s K can be reconstructed by any group of t participants in K (\(1 < t < k\)). A lower bound has been established on the amount of information that participants must hold in order to ensure that any set of up to w participants \((0 \leqslant w \leqslant n - k + t - 1)\) cannot obtain any information about a secret with which they are not associated. In this paper, for parameters t=2 and w=n-k+t-1, we give a construction for multisecret threshold schemes that satisfy this bound.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. R. Blom, An Optimal class of symmetric key generation systems. Advances in Cryptology-Eurocrypt '84, Lecture Notes in Computer Science. Vol. 209 (1984) 335–338.

    Google Scholar 

  2. C. Hiundo, A. De Santis. A. Hemberg, S. Kutlen, U. Vaccaro. and M. Yung. Perfectly-secure key disuibution for dynamic conferences. Advances in Cryptology-Crypto '92, Lecture Notes in Computer Science, Vol. 740 (1993) 471–486

    Google Scholar 

  3. J. W. P Hirschfeld: Projective geometries overfinirefieldr. Clarendon Press (1979).

  4. W.-A. Jackson and K. M. Martin. Geometric secret sharing schemes and their duals. Des. Codes Crypfogr Vol. 4 (1994) 83–95.

    Google Scholar 

  5. W.-A. Jackson, K. M. Martin. and C.M O'Keefe. Multisecret threshold schemes. Advances in Cryptology-Crypta '93. Lecm Notes in Computer Scicnce. Vol 773 (1994) 126–135.

    Google Scholar 

  6. R. Lid1 and H. Niederreiter: Finire Fields. Cambridge University Press, Cambridge (1983).

  7. T. Matsurnolo and H. Irnai. On the key predistribution system: A practical solution to the key predistribution problem. Advances in Cryptology: Crypto '87, Lecture Notes in Computer Science, Vol. 293 (1987) 183–193.

    Google Scholar 

  8. G. J. Simmons. An introdunion to shared sem mdlor shared control scbernes and their application. Contrmpomly Cryptology: The Science of Information Integrity. EEE Press (1992).

  9. D. R. Stinson. An explication of secrrt sharing schemes. Des, Codos Clyptogr: Vol. 2 (1992) 357–390.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Jackson, WA., Martin, K.M. & O'Keefe, C.M. A Construction for Multisecret Threshold Schemes. Designs, Codes and Cryptography 9, 287–303 (1996). https://doi.org/10.1023/A:1027380522085

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1027380522085

Navigation