A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure
Document Type
Article
Publication Date
8-1-2024
Abstract
Sharing confidential information is a critical concern in today's world. Secret sharing schemes facilitate the sharing of secrets in a way that ensures only authorized participants (shareholders) can access the secret using their allocated shares. Hierarchical secret sharing schemes (HSSSs) build upon Shamir's scheme by organizing participants into different levels based on priority. Within HSSS, participants at each level can reconstruct the secret if a specified number, denoted as the threshold value (t), or more of them are present. Each level has a predetermined threshold value. If the number of participants falls below the threshold at any level, higher-level participants must be involved in reconstructing the secret at lower levels. Our paper proposes schemes that implement hierarchical access structures and enable the sharing of multiple secrets. Additionally, our proposed scheme includes share verification. We have analyzed potential attacks and demonstrated the scheme's resistance against them. Through security analysis and comparison with existing schemes, we highlight the novelty and superiority of our proposed approach, contributing to advancements in secure information-sharing practices.
Keywords
access structure, multi-secret, hierarchy, verification, secret sharing, polynomial
Divisions
MathematicalSciences
Funders
Princess Nourah bint Abdulrahman University (PNURSP2024R231),Princess Nourah Bint Abdulrahman University (PNU), Riyadh, Saudi Arabia
Publication Title
Axioms
Volume
13
Issue
8
Publisher
MDPI
Publisher Location
ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND