An Epitome of Multi Secret Sharing Schemes for General Access Structure

V P Binu,A Sreekumar
DOI: https://doi.org/10.48550/arXiv.1406.5596
2014-06-21
Abstract:Secret sharing schemes are widely used now a days in various applications, which need more security, trust and reliability. In secret sharing scheme, the secret is divided among the participants and only authorized set of participants can recover the secret by combining their shares. The authorized set of participants are called access structure of the scheme. In Multi-Secret Sharing Scheme (MSSS), k different secrets are distributed among the participants, each one according to an access structure. Multi-secret sharing schemes have been studied extensively by the cryptographic community. Number of schemes are proposed for the threshold multi-secret sharing and multi-secret sharing according to generalized access structure with various features. In this survey we explore the important constructions of multi-secret sharing for the generalized access structure with their merits and demerits. The features like whether shares can be reused, participants can be enrolled or dis-enrolled efficiently, whether shares have to modified in the renewal phase etc., are considered for the evaluation.
Cryptography and Security
What problem does this paper attempt to address?
The problem that this paper attempts to solve is how to effectively manage multiple secrets in multi - secret sharing schemes (MSSS) and ensure that these secrets can be recovered by authorized subsets of participants according to the general access structure. Specifically, the paper explores the characteristics of different multi - secret sharing schemes, including but not limited to: 1. **Secret Reuse**: Whether the same shares can be used multiple times to recover different secrets without redistributing new shares. 2. **Dynamic Management of Participants**: Whether participants can be added or removed efficiently without affecting the existing secret - sharing structure. 3. **Share Update**: Whether shares need to be modified during the share - update phase. 4. **Security and Efficiency**: How secure the scheme is and how efficient it is in practical applications. By comparing and analyzing existing multi - secret sharing schemes, the paper aims to provide a comprehensive perspective to help researchers and practitioners understand the advantages and limitations of different schemes, so as to select the multi - secret sharing mechanism most suitable for specific application scenarios. In addition, the paper also discusses features such as cheater identification and verifiability, which are important considerations when evaluating multi - secret sharing schemes.