Efficient, XOR-based, ideal (T, n)−threshold schemes

12Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We propose a new, lightweight (t, n)−threshold secret sharing scheme that can be implemented using only XOR operations. Our scheme is based on an idea extracted from a patent application by Hewlett Packard that utilises error correction codes. Our scheme improves on the patent by requiring fewer randomly generated bits and by reducing the size of shares given to each player, thereby making the scheme ideal. We provide a security proof and efficiency analysis. We compare our scheme to existing schemes in the literature and show that our scheme is more efficient than other schemes, especially when t is large.

Cite

CITATION STYLE

APA

Chen, L., Laing, T. M., & Martin, K. M. (2016). Efficient, XOR-based, ideal (T, n)−threshold schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10052 LNCS, pp. 467–483). Springer Verlag. https://doi.org/10.1007/978-3-319-48965-0_28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free