Space efficient secret sharing for implicit data security
This paper presents a k-threshold computational secret sharing technique that distributes a secret S into shares of size | S | k - 1 , where ∣ S∣ denotes the secret size. This bound is close to the space optimal bound of | S | k if the secret is to be recovered from k shares. In other words, our tec...
Saved in:
Published in | Information sciences Vol. 181; no. 2; pp. 335 - 341 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Elsevier Inc
15.01.2011
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | This paper presents a
k-threshold computational secret sharing technique that distributes a secret
S into shares of size
|
S
|
k
-
1
, where ∣
S∣ denotes the secret size. This bound is close to the space optimal bound of
|
S
|
k
if the secret is to be recovered from
k shares. In other words, our technique can be looked upon as a new information dispersal scheme that provides near optimal space efficiency. The proposed scheme makes use of repeated polynomial interpolation and has potential applications in secure information dispersal on the Web and in sensor networks. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
ISSN: | 0020-0255 1872-6291 |
DOI: | 10.1016/j.ins.2010.09.013 |