Hash function-based secret sharing scheme designs

Authors

  • Chi Sing Chum,

    1. Department of Computer Science, Graduate Center, City University of New York, New York, NY, U.S.A.
    Search for more papers by this author
  • Xiaowen Zhang

    Corresponding author
    1. Department of Computer Science, Graduate Center, City University of New York, New York, NY, U.S.A.
    • Department of Computer Science, College of Staten Island, City University of New York, Staten Island, NY, U.S.A.
    Search for more papers by this author

Correspondence: Xiaowen Zhang, Department of Computer Science, College of Staten Island, City University of New York, 2800 Victory Blvd, Staten Island, NY 10314, U.S.A.

E-mail: xiaowen.zhang@csi.cuny.edu

ABSTRACT

Secret sharing schemes create an effective method to safeguard a secret by dividing it among several participants. By using hash functions and the herding hashes technique, we first set up a (t + 1, n) threshold scheme that is perfect and ideal and then extend it to schemes for any general access structure. The schemes can be further set up as proactive or verifiable if necessary. The setup and recovery of the secret are efficient because of the fast calculation of the hash function. The proposed scheme is flexible because of the use of existing hash functions. Copyright © 2012 John Wiley & Sons, Ltd.

Ancillary