首页> 外文会议>International conference on cryptology and network security >Computational Aspects of Ideal (i, n)-Threshold Scheme of Chen, Laing, and Martin
【24h】

Computational Aspects of Ideal (i, n)-Threshold Scheme of Chen, Laing, and Martin

机译:Chen,Laing和Martin的理想(i,n)-阈值方案的计算方面

获取原文

摘要

In CANS 2016, Chen, Laing, and Martin proposed an ideal (t,n)-threshold secret sharing scheme (the CLM scheme) based on random linear code. However, in this paper we show that this scheme is essentially same as the one proposed by Karnin, Greene, and Hellman in 1983 (the KGH scheme) from privacy perspective. Further, the authors did not analyzed memory or XOR operations required to either store or calculate an inverse matrix needed for recovering the secret. In this paper, we analyze computational aspects of the CLM scheme and discuss various methods through which the inverse matrix required during the secret recovery can be obtained. Our analysis shows that for n ≤ 30 all the required inverse matrices can be stored in memory whereas for 30 ≤ n < 9000 calculating the inverse as and when required is more appropriate. However, the CLM scheme becomes impractical for n > 9000. Another method which we discuss to recover the secret in KGH scheme is to obtain only the first column of the inverse matrix using Lagrange's interpolation however, as we show, this method can not be used with the CLM scheme. Some potential application of the secret sharing schemes are also discussed. From our analysis we conclude that the CLM scheme is neither novel nor as practical as has been suggested by Chen et al. whereas the KGH scheme is better suited for practical applications with large n.
机译:在CANS 2016中,Chen,Laing和Martin提出了一种基于随机线性码的理想(t,n)阈值秘密共享方案(CLM方案)。但是,在本文中,我们从隐私的角度证明了该方案与Karnin,Greene和Hellman于1983年提出的方案(KGH方案)基本相同。此外,作者没有分析存储或计算恢复秘密所需的逆矩阵所需的内存或XOR操作。在本文中,我们分析了CLM方案的计算方面,并讨论了各种方法,通过这些方法可以获得秘密恢复期间所需的逆矩阵。我们的分析表明,对于n≤30,所有必需的逆矩阵都可以存储在内存中,而对于30≤n <9000,则在需要时计算逆矩阵更为合适。但是,对于n> 9000而言,CLM方案变得不切实际。我们讨论的用于恢复KGH方案秘密的另一种方法是使用拉格朗日插值仅获得逆矩阵的第一列,但是,如我们所示,该方法无法使用CLM方案。还讨论了秘密共享方案的一些潜在应用。根据我们的分析,我们得出结论,CLM方案既不新颖,也不像Chen等人所建议的那样实用。而KGH方案更适合于n大的实际应用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号