Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures

Abstract Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges. The construction of secret sharing schemes for such access structures has been the attention...

Full description

Saved in:
Bibliographic Details
Main Authors: Ferucio Laurenţiu Ţiplea, Constantin Cătălin Drăgan
Format: Article
Language:English
Published: Wiley 2021-07-01
Series:IET Information Security
Subjects:
Online Access:https://doi.org/10.1049/ise2.12014
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832558656204308480
author Ferucio Laurenţiu Ţiplea
Constantin Cătălin Drăgan
author_facet Ferucio Laurenţiu Ţiplea
Constantin Cătălin Drăgan
author_sort Ferucio Laurenţiu Ţiplea
collection DOAJ
description Abstract Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges. The construction of secret sharing schemes for such access structures has been the attention of researchers for a long time. Two main approaches have been taken so far, one of them is based on polynomial interpolation and the other one is based on the Chinese Remainder Theorem (CRT). In this article the first asymptotically ideal CRT‐based secret sharing schemes for (disjunctive, conjunctive) multilevel and compartmented access structures are proposed. Our approach is compositional and it is based on a variant of the Asmuth‐Bloom secret sharing scheme where some participants may have public shares. Based on this, the proposed secret sharing schemes for multilevel and compartmented access structures are asymptotically ideal if and only if they are based on 1‐compact sequences of co‐primes. Possible applications for secret image and multi‐secret sharing are pointed‐out.
format Article
id doaj-art-59b8869ec2b64f309f7b7abc4cbcd170
institution Kabale University
issn 1751-8709
1751-8717
language English
publishDate 2021-07-01
publisher Wiley
record_format Article
series IET Information Security
spelling doaj-art-59b8869ec2b64f309f7b7abc4cbcd1702025-02-03T01:31:54ZengWileyIET Information Security1751-87091751-87172021-07-0115428229610.1049/ise2.12014Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structuresFerucio Laurenţiu Ţiplea0Constantin Cătălin Drăgan1Department of Computer Science Alexandru Ioan Cuza University of Iasi Iasi RomaniaUniversity of Surrey Faculty of Engineering and Physical Sciences Surrey UKAbstract Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges. The construction of secret sharing schemes for such access structures has been the attention of researchers for a long time. Two main approaches have been taken so far, one of them is based on polynomial interpolation and the other one is based on the Chinese Remainder Theorem (CRT). In this article the first asymptotically ideal CRT‐based secret sharing schemes for (disjunctive, conjunctive) multilevel and compartmented access structures are proposed. Our approach is compositional and it is based on a variant of the Asmuth‐Bloom secret sharing scheme where some participants may have public shares. Based on this, the proposed secret sharing schemes for multilevel and compartmented access structures are asymptotically ideal if and only if they are based on 1‐compact sequences of co‐primes. Possible applications for secret image and multi‐secret sharing are pointed‐out.https://doi.org/10.1049/ise2.12014cryptographyinterpolationpolynomialsprivate key cryptography
spellingShingle Ferucio Laurenţiu Ţiplea
Constantin Cătălin Drăgan
Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures
IET Information Security
cryptography
interpolation
polynomials
private key cryptography
title Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures
title_full Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures
title_fullStr Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures
title_full_unstemmed Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures
title_short Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures
title_sort asymptotically ideal chinese remainder theorem based secret sharing schemes for multilevel and compartmented access structures
topic cryptography
interpolation
polynomials
private key cryptography
url https://doi.org/10.1049/ise2.12014
work_keys_str_mv AT feruciolaurentiutiplea asymptoticallyidealchineseremaindertheorembasedsecretsharingschemesformultilevelandcompartmentedaccessstructures
AT constantincatalindragan asymptoticallyidealchineseremaindertheorembasedsecretsharingschemesformultilevelandcompartmentedaccessstructures