Distributed Secret Sharing Scheme Based on Personalized Spherical Coordinates Space

Zhenhua Tan1, Guangming Yang1, Wei Cheng1 and Xingwei Wang2

  1. Software College of Northeastern University, POB 349#
    110819 Shenyang, China
    {tanzh, yanggm, chengw}@mail.neu.edu.cn
  2. Faculty of Information Science and Engineering of Northeastern University
    11 0819 Shenyang, China
    wangxw@mail.neu.edu.cn

Abstract

Threshold secret sharing schemes are ideal to protect confidential information. In this paper, we propose a novel distributed threshold secret sharing scheme based on spherical coordinates. As four non-coplanar points can determine a unique sphere, we design transformation algorithms to generate secret as sphere center and mapping algorithms to convert participants to be sphere surface points. An algorithm to generate shadow secrets is proposed based on spherical coordinates. Verifiability and proactivity secret sharing are considered during the procedures of generating shadows and recovering secret and four or more participants could recover secret in our scheme. Performance analysis proves that the proposed scheme has relatively advantage in computation complexity, storage space and communication amounts during distribution and reconstruction processes, and it can tolerate collusion attacks and detect dishonest participants.

Key words

secret sharing, distributed security, secret protection.

Digital Object Identifier (DOI)

https://doi.org/10.2298/CSIS120801048T

Publication information

Volume 10, Issue 3 (June 2013)
Year of Publication: 2013
ISSN: 1820-0214 (Print) 2406-1018 (Online)
Publisher: ComSIS Consortium

Full text

DownloadAvailable in PDF
Portable Document Format

How to cite

Tan, Z., Yang, G., Cheng, W., Wang, X.: Distributed Secret Sharing Scheme Based on Personalized Spherical Coordinates Space. Computer Science and Information Systems, Vol. 10, No. 3, 1269-1291. (2013)