Skip to main content
Log in

How to Fairly Share Multiple Secrets Stage by Stage

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

A multi-stage secret sharing scheme (MSSS) allows a dealer to share multiple secrets among a set of participants, in such a way that any authorized subset of participants can reconstruct the secrets stage-by-stage. In this paper, for the first time we propose an efficient MSSS based on the non-homogeneous linear feedback shift register (NHLFSR). According to the properties of NHLFSRs, this scheme has few public information, a new simple distribution, and various techniques for the reconstruction phase.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Iftene, S. (2007). General secret sharing based on the chinese remaindertheorem with applications in e-voting. Electronic Notes inTheoretical Computer Science, 186, 6784.

    MathSciNet  MATH  Google Scholar 

  2. Hsu, C.-F., & Harn, L. (2014). Multipartite secret sharing based on CRT. Wireless Personal Communications, 78, 271–282.

    Article  Google Scholar 

  3. Schoenmakers, B. (2011). Encyclopedia of cryptography and security. In H. C. A. van Tilborg & S. Jajodia (Eds.), Verifiable secret sharing (pp. 1357–1358). Heidelberg: Springer.

    Google Scholar 

  4. Shamir, A. (1979). How to share a secret. Communications of the ACM, 22, 612–613.

    Article  MathSciNet  MATH  Google Scholar 

  5. Wu, T.-Y., & Tseng, Y.-M. (2011). A pairing-based publicly verifiable secret sharing scheme. Journal of Systems Science and Complexity, 24, 186–194.

    Article  MathSciNet  MATH  Google Scholar 

  6. Dehkordi, M. H., & Mashhadi, S. (2008). An efficient threshold verifiable multi-secret sharing. Computer Standards and Interfaces, 30, 187–190.

    Article  MATH  Google Scholar 

  7. Eslami, Z., & Kabiri Rad, S. (2012). A new verifiable multi-secret sharing scheme based on bilinear maps. Wireless Personal Communications, 63, 45946.

    Article  Google Scholar 

  8. Lin, C., & Harn, L. (2012). Unconditionally secure verifiable secret sharing scheme. Advances in Information Sciences and Service Sciences, 4, 514–518.

    Article  Google Scholar 

  9. Hadian, M., & Mashhadi, S. (2008). New efficient and practical verifiable multi-secret sharing schemes. Information Sciences, 178, 2262–2274.

    Article  MathSciNet  MATH  Google Scholar 

  10. Mashhadi, S. (2015). Computationally-secure multiple secret sharing: Models schemes, and formal security analysis. The ISC International Journal of Information Security, 7, 91–99.

    Article  Google Scholar 

  11. Chang, T.-Y., Hwang, M.-S., & Yang, W.-P. (2005). A new multi-stage secret sharing scheme using one-way function. ACM SIGOPS Operating Systems, 39, 48–55.

    Article  Google Scholar 

  12. Fatemi, M., Eghlidos, T., & Aref, M. R. (2009). A multi-stage secret sharing scheme using all-or-nothing transform approach. LNCS, 5927, 449–458.

    Google Scholar 

  13. Harn, L. (1995). Comment multistage secret sharing based on one-way function. Electronics Letters, 31, 262.

    Article  Google Scholar 

  14. He, J., & Dawson, E. (1994). Multistage secret sharing based on one-way function. Electronics Letters, 30, 1591–1592.

    Article  Google Scholar 

  15. Li, H.-X., Cheng, C.-T., & Pang, L.-J. (2005). An impoved multi-stage \((t, n)\)-threshold secret sharing scheme. LNCS, 3739, 267–274.

    Google Scholar 

  16. Hadian, M., & Mashhadi, S. (2008). Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves. Computer Communications, 31, 1777–1784.

    Article  Google Scholar 

  17. Biggs, N. L. (1989). Discrete mathematics (Revised ed.). New York: Oxford University Press.

    MATH  Google Scholar 

  18. Mashhadi, S., & Hadian, M. (2015). Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem. Information Sciences, 294, 31–40.

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Samaneh Mashhadi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mashhadi, S. How to Fairly Share Multiple Secrets Stage by Stage. Wireless Pers Commun 90, 93–107 (2016). https://doi.org/10.1007/s11277-016-3332-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3332-7

Keywords

Navigation