Abstract
Secret Sharing from the perspective of threshold schemes has been well-studied over the past decade. Threshold schemes, however, can only handle a small fraction of the secret sharing functions which we may wish to form. For example, if it is desirable to divide a secret among four participants A, B. C, and D in such a way that either A together with B can reconstruct the secret or C together with D can reconstruct the secret, then threshold schemes (even with weighting) are provably insufficient.
This paper will present general methods for constructing secret sharing schemes for any given secret sharing function. There is a natural correspondence between the set of “generalized” secret sharing functions and the set of monotone functions, and tools developed for simplifying the latter set can be applied equally well to the former set.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Asmuth, C. and Bloom, J. “A Modular Approach to Key Safeguarding.” Texas A&M University, Department of Mathematics, College Station, TX (1980).
Benaloh, J. “Secret Sharing Homomorphism: Keeping Shares of a Secret Secret” Proc. Crypto’ 86, Santa Barbara, CA (Aug. 1986), 251–260. Published as Advances in Cryptology, ed. by A. Odlyzko in Lecture Notes in Computer Science, vol. 263, ed. by G. Goos and J. Hartmanis. Springer-Verlag, New York (1987).
Benaloh, J. “Verifiable Secret-Ballot Elections.” Ph.D. Thesis presented at Yale University (Sep. 1987).
Blakley, G. “Safeguarding Cryptographic Keys.” Proc. AFIPS 1979 National Computer Conference, New York, NY (June 1979), 313–317.
Feldman, P. “A Practical Scheme for Non-interactive Verifiable Secret Sharing.” Proc. 28thIEEE Symp. on Foundations of Computer Science, Los Angeles, CA (Oct. 1987), 427–437.
Ito, M., Saito, A., and Nishizeki, T. “Secret Sharing Scheme Realizing General Access Structure.” Proc. Glob. Com, (1987).
Kothari, S. “Generalized Linear Threshold Scheme.” Proc. Crypto’ 84, Santa Barbara, CA (Aug. 1984), 231–241. Published as Advances in Cryptology, ed. by G. Blakley and D. Chaum in Lecture Notes in Computer Science, vol. 196, ed. by G. Goos and J. Hartmanis. Springer-Verlag, New York (1985).
Shamir, A. “How to Share a Secret.” Comm. ACM 22, 11 (Nov. 1979), 612–613.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1990 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Benaloh, J., Leichter, J. (1990). Generalized Secret Sharing and Monotone Functions. In: Goldwasser, S. (eds) Advances in Cryptology — CRYPTO’ 88. CRYPTO 1988. Lecture Notes in Computer Science, vol 403. Springer, New York, NY. https://doi.org/10.1007/0-387-34799-2_3
Download citation
DOI: https://doi.org/10.1007/0-387-34799-2_3
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-97196-4
Online ISBN: 978-0-387-34799-8
eBook Packages: Springer Book Archive