2016
DOI: 10.1109/tit.2016.2616144
|View full text |Cite
|
Sign up to set email alerts
|

Communication Efficient Secret Sharing

Abstract: Abstract-A secret sharing scheme is a method to store information securely and reliably. Particularly, in a threshold secret sharing scheme, a secret is encoded into n shares, such that any set of at least t1 shares suffice to decode the secret, and any set of at most t2 < t1 shares reveal no information about the secret. Assuming that each party holds a share and a user wishes to decode the secret by receiving information from a set of parties; the question we study is how to minimize the amount of communicat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
102
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 65 publications
(103 citation statements)
references
References 25 publications
(72 reference statements)
1
102
0
Order By: Relevance
“…There are several previous works that have considered Shamir's scheme in the context of networks [17] and distributed storage systems [18], [19]. In these works, there is only one secret, as in the original Shamir's scheme, to be distributed to users either as nodes of a network [17] or as users of a distributed storage system [18], [19], in a collusion-resistant way. However, we consider a multi-user secret sharing scenario, where there is one designated secret for each user, and the secret shares are distributed over a set of storage nodes.…”
Section: Shamir's Scheme and Related Workmentioning
confidence: 99%
“…There are several previous works that have considered Shamir's scheme in the context of networks [17] and distributed storage systems [18], [19]. In these works, there is only one secret, as in the original Shamir's scheme, to be distributed to users either as nodes of a network [17] or as users of a distributed storage system [18], [19], in a collusion-resistant way. However, we consider a multi-user secret sharing scenario, where there is one designated secret for each user, and the secret shares are distributed over a set of storage nodes.…”
Section: Shamir's Scheme and Related Workmentioning
confidence: 99%
“…Interestingly, the lower bound on the repair bandwidth of an MDS vector code given in (2.3) continues to hold even when the contacted nodes contribute different number of symbols during the repair process [11], i.e., for every i ∈ [n] and R ⊆ [n]\{i} such that |R| = d, we have…”
Section: Background and Related Workmentioning
confidence: 99%
“…Given this vector representation of the MDS code, the repair bandwidth of an MDS code is lower bounded by [4,11] …”
Section: Introductionmentioning
confidence: 99%
“…The optimal rate is known to be n−r−z n , namely, the maximum message size is achieved when k = n − r − z [11]. Constructions of rate-optimal schemes are well known, such as Shamir's (ramp) secret sharing scheme [20].…”
Section: Setup and Definitionsmentioning
confidence: 99%