Mini Review Volume 2 Issue 5
Department of Mathematics and Statistics, Imam Hossein Comprehensive University, Iran
Correspondence: Ali Nakhaei Amroudi, Department of Mathematics and Statistics, Imam Hossein Comprehensive University, Iran, Tel +989139525429
Received: September 13, 2017 | Published: November 28, 2018
Citation: Amroudi AN. Secret sharing schemes. Electric Electron Tech Open Acc J. 2018;2(5):310-311. DOI: 10.15406/eetoaj.2018.02.00033
In the (n, m)-threshold secret sharing scheme, there are n participants in the system such that at least n or more participants can easily pool their shares and reconstruct the secret. In this paper, we review some significant secret sharing schemes. In fact, we present numerous constructions for secret sharing schemes.
Keywords: threshold secret sharing scheme, multi secret sharing scheme, quantum secret sharing scheme, post quantum secret sharing scheme
According to Time Magazine, May 4, 1992, control of nuclear weapons in Russia involves a two-out-of-three mechanism. In order to launch a nuclear missile, the cooperation of at least two parties out of three are needed.1 The three parties involved are the president, the Defence Minister, and the Defence Ministry. Secret sharing schemes have many other applications, such as e-voting 2 e-auction2,3 and threshold access control.4 In 1987, Ito, Saito and Nishizeki gave a construction which shows that there exists a perfect secret sharing scheme realizing any monotone access structure.5 In this paper, after introducing (n, m)-threshold secret sharing, the problem of sharing some secrets simultaneously is introduced. Then we the quantum and post quantum secret sharing scheme is presented.
(t,n)- Threshold secret sharing scheme
Shamir and Blakely6,7 proposed the first (n, m)-threshold secret sharing independently in 1979. A (n, m)-threshold secret sharing is the couple of (P; S) in which the secret S has been shared among the participants P=(P1,…,Pm) such that every subset of P, which has at least n members, can retrieve S, and every subset of P, which has at most n-1 members, can not obtain any information about S. A secret sharing scheme is called verifiable secret sharing scheme if every participant can verify the validity of his/her share without obtaining information about S.5,8
Multi secret sharing scheme
The (k, n, m)-multi-secret sharing firstly proposed 9 In the (k, n, m)-threshold multi secret sharing scheme, there are m participants in the system. At least n or more participants can easily pool their shares and reconstruct n secrets at the same time7 Shao introduced a novel verifiable multi-secret sharing scheme based on Lagrange interpolation and hash function8 that satisfied robustness, confidentiality, n-consistence, and traceability properties. His scheme is based on Shamir's secret sharing scheme. A verifiable (k, n, m)-multi-secret sharing scheme is one (k, n, m)-multi-secret sharing scheme, which has four properties: robustness, confidentiality, n-consistence, and traceability.8 Robustness means that if n or more participants pool their shares then they can recover the k secrets; confidentiality means if fewer than n participants pool their shares then they cannot recover the k secrets; n-consistence means that any n participants can recover the k secrets; finally, traceability means that any participant can trace the validation of his share.
Quantum secret sharing scheme
In quantum crytography, the security of the cryptosystems is based on the laws of quantum mechanics, instead of mathematical assumptions. The designs of Quantum Secret Sharing(QSS) schemes do not follow in general from the designs of classical schemes, since the laws of quantum mechanics have to be obeyed. In 2000 the quantum secret sharing scheme based on Monotone Span Programs (MSPs) was introduced10,11 Quantum information theoretical model for quantum secret sharing schemes. The information theoretical description of a QSS scheme was introduced.12 Later, several theorems were proved according to the definition.12
Post quantum secret sharing scheme
Many secret sharing schemes, have been introduced up to now; however some of the proposed schemes have not n-consistence property 9–13 and some of them are based on either RSA or DLP assumptions7,14 whereas these assumptions are not resistant against quantum attacks.15–22 The secret sharing schemes which is resistant against quantum attacks are called Post Quantum Secret Sharing Scheme (PQSSS). The first PQSSSs were introduced in23,24 Recently, Nakhaei Amroudi et al. introduced some post quantum secret sharing schemes.22
None.
The author declares there is no conflicts of interest.
©2018 Amroudi. This is an open access article distributed under the terms of the, which permits unrestricted use, distribution, and build upon your work non-commercially.