A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure

Document Type

Article

Publication Date

8-1-2024

Abstract

Sharing confidential information is a critical concern in today's world. Secret sharing schemes facilitate the sharing of secrets in a way that ensures only authorized participants (shareholders) can access the secret using their allocated shares. Hierarchical secret sharing schemes (HSSSs) build upon Shamir's scheme by organizing participants into different levels based on priority. Within HSSS, participants at each level can reconstruct the secret if a specified number, denoted as the threshold value (t), or more of them are present. Each level has a predetermined threshold value. If the number of participants falls below the threshold at any level, higher-level participants must be involved in reconstructing the secret at lower levels. Our paper proposes schemes that implement hierarchical access structures and enable the sharing of multiple secrets. Additionally, our proposed scheme includes share verification. We have analyzed potential attacks and demonstrated the scheme's resistance against them. Through security analysis and comparison with existing schemes, we highlight the novelty and superiority of our proposed approach, contributing to advancements in secure information-sharing practices.

Keywords

access structure, multi-secret, hierarchy, verification, secret sharing, polynomial

Divisions

MathematicalSciences

Funders

Princess Nourah bint Abdulrahman University (PNURSP2024R231),Princess Nourah Bint Abdulrahman University (PNU), Riyadh, Saudi Arabia

Publication Title

Axioms

Volume

13

Issue

8

Publisher

MDPI

Publisher Location

ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND

This document is currently not available here.

Share

COinS