Verifiable secret sharing for monotone access structures

  • Authors:
  • Thomas Beth;Hans-Joachim Knobloch;Marcus Otten

  • Affiliations:
  • Universität Karlsruhe, European Institute for System Security, Am Fasanengarten 5, D-76128 Karlsruhe, Germany;Universität Karlsruhe, European Institute for System Security, Am Fasanengarten 5, D-76128 Karlsruhe, Germany;Universität Karlsruhe, European Institute for System Security, Am Fasanengarten 5, D-76128 Karlsruhe, Germany

  • Venue:
  • CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
  • Year:
  • 1993

Quantified Score

Hi-index 0.00

Visualization

Abstract

Several verifiable secret sharing schemes for threshold schemes based on polynomial interpolation have been presented in the literature. Simmons and others introduced secret sharing (also called shared control) schemes based on finite geometries, which allow istributing a secret according to any monotone access structure.In this paper we present a verifiable secret sharing scheme for a class of these geometry-based secret sharing schemes, which thus provides verifiable sharing of secrets according to general monotone access structures.Our scheme relies on the homomorphic properties of the discrete exponentiation and therefore on the cryptographic security of the discrete logarithm. The version based on Simmons' scheme is non-interactive.