Some Structural and Security Properties of the Modular Secret Sharing
We mainly study the modular secret sharing over the ring of univariate polynomials over the Galois field. The proposed modular schemes over these rings achieve improvements both in security and applicability compared to classical schemes over the ring of integers. Our threshold schemes are perfect i...
Gespeichert in:
| Veröffentlicht in: | Symbolic and Numeric Algorithms for Scientific Computing, Proceedings S. 197 - 200 |
|---|---|
| Hauptverfasser: | , , |
| Format: | Tagungsbericht |
| Sprache: | Englisch |
| Veröffentlicht: |
IEEE
01.09.2008
|
| Schlagworte: | |
| ISBN: | 0769535232, 9780769535234 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | We mainly study the modular secret sharing over the ring of univariate polynomials over the Galois field. The proposed modular schemes over these rings achieve improvements both in security and applicability compared to classical schemes over the ring of integers. Our threshold schemes are perfect i.e. secure in the sense of information theory and ideal i.e. efficient in the terms of memory storage (the size of the secret is equal to the size of the shares). Then we consider the modular secret sharing schemes with pairwise co-prime moduli over the ring of polynomials and the ring of integers. We give a complete description of the access structures that can be realized by such modular schemes. |
|---|---|
| AbstractList | We mainly study the modular secret sharing over the ring of univariate polynomials over the Galois field. The proposed modular schemes over these rings achieve improvements both in security and applicability compared to classical schemes over the ring of integers. Our threshold schemes are perfect i.e. secure in the sense of information theory and ideal i.e. efficient in the terms of memory storage (the size of the secret is equal to the size of the shares). Then we consider the modular secret sharing schemes with pairwise co-prime moduli over the ring of polynomials and the ring of integers. We give a complete description of the access structures that can be realized by such modular schemes. |
| Author | Galibus, T. Matveev, G. Shenets, N. |
| Author_xml | – sequence: 1 givenname: T. surname: Galibus fullname: Galibus, T. organization: Dept. of Math. Modelling & Data Anal., Belorussian State Univ., Minsk, Belarus – sequence: 2 givenname: G. surname: Matveev fullname: Matveev, G. – sequence: 3 givenname: N. surname: Shenets fullname: Shenets, N. organization: Dept. of Math. Modelling & Data Anal., Belorussian State Univ., Minsk, Belarus |
| BookMark | eNotjElPwzAYRC1BJUjplQsX_4EU78uxisoilUUyHDhVjvOZBqVJ5TiH_ntawVxGevM0Bbrshx4QuqVkSSmx9-7rdeWqJSPELKm4QAXRykouGWczVJyx5ZYydoUW4_hDTpHSGMuu0doNe8AupynkKfkO-77BDsKU2nzE72k4QMotjHiIOO8AvwzN1Pl0VhJk7HY-tf33DZpF342w-O85-nxYf1RP5ebt8blabcqWaplLoWtmvLYqyqBqIYLnMeo6BiV9w70G4Y21UVBlG6tAMnHaGNEmGM3Bej5Hd3-_LQBsD6nd-3TcSkaEoZT_AlqtTUs |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/SYNASC.2008.14 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Sciences (General) Mathematics |
| EndPage | 200 |
| ExternalDocumentID | 5204811 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AARBI AAWTH ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IERZE OCL RIB RIC RIE RIL |
| ID | FETCH-LOGICAL-i175t-47b28a796f5c6b44ca3ff7bfc65ad3a7e4a899f4169d96e524bfc2078c873e9a3 |
| IEDL.DBID | RIE |
| ISBN | 0769535232 9780769535234 |
| ISICitedReferencesCount | 7 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000274363300031&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 27 01:36:26 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCN | 2008939122 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i175t-47b28a796f5c6b44ca3ff7bfc65ad3a7e4a899f4169d96e524bfc2078c873e9a3 |
| PageCount | 4 |
| ParticipantIDs | ieee_primary_5204811 |
| PublicationCentury | 2000 |
| PublicationDate | 2008-Sept. |
| PublicationDateYYYYMMDD | 2008-09-01 |
| PublicationDate_xml | – month: 09 year: 2008 text: 2008-Sept. |
| PublicationDecade | 2000 |
| PublicationTitle | Symbolic and Numeric Algorithms for Scientific Computing, Proceedings |
| PublicationTitleAbbrev | SYNASC |
| PublicationYear | 2008 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000558892 |
| Score | 1.4372164 |
| Snippet | We mainly study the modular secret sharing over the ring of univariate polynomials over the Galois field. The proposed modular schemes over these rings achieve... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 197 |
| SubjectTerms | Cryptography Data analysis Data security Galois fields Information security Information theory Mathematical model Mathematics Polynomials Scientific computing |
| Title | Some Structural and Security Properties of the Modular Secret Sharing |
| URI | https://ieeexplore.ieee.org/document/5204811 |
| WOSCitedRecordID | wos000274363300031&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlZ07T8MwEMetUjHAAn0g3vLAABKhqePY8YiqViytKgWkMlUX-yx1oKnawufHTt3AwMKWp534FPnO-d_vCLljJgENqY5YEWsXoEgdAY8xUtZ5DyC0ghiqYhNyMslmMzVtkMc6FwYRK_EZPvnN6l--KfWnXyrrpZ4y6xN5D6QUu1ytej0lTtMsUyEyVx5akrAA2Nnv8wBt7Meql79PnvPBTkvpM3h-lVapZpbRyf-e6ZR0f1L06LSefFqkgcs2OR7XENZNm7TCd7uh9wEu_dAhw7z8QJpX1FhP3KCwNDQPRex8iysvtHb3lJa6tui4NF6o6i9Z45Z6vrPrr0veRsPXwUsUSilEC-cfbCMuC5aBVMKmWhSca0islYXVziDOWhI5uMDLOu9MGSUwZdydY8590JlMUEFyRprLconnhBoAkaFkAlFzw4SyRiFYqWILGed4QTp-lOarHS1jHgbo8u_DV-Ror8CI-9ek6V4fb8ih_touNuvbysTfFxyk_w |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFA9jCupF9yF-m4MHBeu6NG2ao4yNiVsZdMI8jTR5gR1sxzb9-026rHrw4q2faXmPkvfS3wdCd0QFQopQeiTzpWlQmPQE9cHj2lQPIpJc-KI0m2BJEs9mfFJDjxUXBgBK8Bk82c3yX74q5KddKuuEVmXWEnn3rHOWY2tVKyp-GMYxd705t7IlAXESO7t96mQbuz7vpO_Jc9rboikth-eXuUo5twyO__dWJ6j9Q9LDk2r6aaAa5E10NK5kWNdN1HBf7hrfO3nphxbqp8UH4LTUjbWaG1jkCqfOxs6OuLRQa3NPobEZC48LZaGq9pIVbLBVeDbPa6O3QX_aG3rOTMFbmAph41GWkVgwHulQRhmlUgRas0xLkxKTLwZUmNZLm_qMKx5BSKg5R0wBIWMWABfBKarnRQ5nCCshohgYiQAkVSTiWnEQmnFfi5hSOEctG6X5cquXMXcBuvj78C06GE7Ho_noJXm9RIc7PIbfvUJ1Ewq4Rvvya7NYr27KdH8D4bCoSA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Symbolic+and+Numeric+Algorithms+for+Scientific+Computing%2C+Proceedings&rft.atitle=Some+Structural+and+Security+Properties+of+the+Modular+Secret+Sharing&rft.au=Galibus%2C+T.&rft.au=Matveev%2C+G.&rft.au=Shenets%2C+N.&rft.date=2008-09-01&rft.pub=IEEE&rft.isbn=9780769535234&rft.spage=197&rft.epage=200&rft_id=info:doi/10.1109%2FSYNASC.2008.14&rft.externalDocID=5204811 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769535234/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769535234/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769535234/sc.gif&client=summon&freeimage=true |

