A necessary and sufficient condition for the asymptotic idealness of the GRS threshold secret sharing scheme
The study of the asymptotic idealness of the Goldreich–Ron–Sudan (GRS, for short) threshold secret sharing scheme was the subject of several research papers, where sufficient conditions were provided. In this paper a necessary and sufficient condition is established; namely, it is shown that the GRS...
Saved in:
Published in | Information processing letters Vol. 114; no. 6; pp. 299 - 303 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Amsterdam
Elsevier B.V
01.06.2014
Elsevier Sequoia S.A |
Subjects | |
Online Access | Get full text |
ISSN | 0020-0190 1872-6119 |
DOI | 10.1016/j.ipl.2014.01.008 |
Cover
Abstract | The study of the asymptotic idealness of the Goldreich–Ron–Sudan (GRS, for short) threshold secret sharing scheme was the subject of several research papers, where sufficient conditions were provided. In this paper a necessary and sufficient condition is established; namely, it is shown that the GRS threshold secret sharing scheme is asymptotically ideal under the uniform distribution on the secret space if and only if it is based on 1-compact sequences of co-primes.
•Previous results regarding the security of the GRS secret sharing scheme are improved.•The GRS scheme is asymptotically ideal iff it is based on 1-compact sequences of co-primes.•The asymptotic idealness issue of the GRS scheme is completely closed.•The importance of 1-compact sequences of co-primes is emphasized. |
---|---|
AbstractList | The study of the asymptotic idealness of the Goldreich-Ron-Sudan (GRS, for short) threshold secret sharing scheme was the subject of several research papers, where sufficient conditions were provided. In this paper a necessary and sufficient condition is established; namely, it is shown that the GRS threshold secret sharing scheme is asymptotically ideal under the uniform distribution on the secret space if and only if it is based on 1-compact sequences of co-primes. [PUBLICATION ABSTRACT] The study of the asymptotic idealness of the Goldreich–Ron–Sudan (GRS, for short) threshold secret sharing scheme was the subject of several research papers, where sufficient conditions were provided. In this paper a necessary and sufficient condition is established; namely, it is shown that the GRS threshold secret sharing scheme is asymptotically ideal under the uniform distribution on the secret space if and only if it is based on 1-compact sequences of co-primes. •Previous results regarding the security of the GRS secret sharing scheme are improved.•The GRS scheme is asymptotically ideal iff it is based on 1-compact sequences of co-primes.•The asymptotic idealness issue of the GRS scheme is completely closed.•The importance of 1-compact sequences of co-primes is emphasized. The study of the asymptotic idealness of the Goldreich-Ron-Sudan (GRS, for short) threshold secret sharing scheme was the subject of several research papers, where sufficient conditions were provided. In this paper a necessary and sufficient condition is established; namely, it is shown that the GRS threshold secret sharing scheme is asymptotically ideal under the uniform distribution on the secret space if and only if it is based on 1-compact sequences of co-primes. |
Author | Ţiplea, Ferucio Laurenţiu Drăgan, Constantin Cătălin |
Author_xml | – sequence: 1 givenname: Ferucio surname: Tiplea middlename: Laurentiu fullname: Tiplea, Ferucio Laurentiu – sequence: 2 givenname: Constantin surname: Dragan middlename: Catalin fullname: Dragan, Constantin Catalin |
BookMark | eNp9kbFqHDEQhoVxIGcnD5BOkCbNrmd2T6sVqYxJnIDBkNi10GpHPh170kXSBfz21uVSuXA1xfzfz_DNBTsPMRBjnxBaBByutq3fL20HuG4BW4DxjK1wlF0zIKpztgLooAFU8J5d5LwFgGHdyxVbrnkgSzmb9MxNmHk-OOetp1C4jWH2xcfAXUy8bIib_Lzbl1i85X4ms4QK8uj-7W5__a4zUd7EpdaQTVR43pjkwxPPdkM7-sDeObNk-vh_XrLH798ebn40d_e3P2-u7xrbi7E0qEg4R5N0w2znUTozqUGq3qGYXCdQ9JOd-3ESCqGHSU1SqEmsFSKC6tH0l-zLqXef4p8D5aJ3PltaFhMoHrKuDQidEuNQo59fRbfxkEK9rqZAjjBKJWoKTymbYs6JnN4nv6vKNII--tdbXf3ro38NqKv_yshXjPXFHHWWZPzyJvn1RFJ19NdT0vn4EEuzT2SLnqN_g34BwayiKg |
CODEN | IFPLAT |
CitedBy_id | crossref_primary_10_1016_j_ins_2018_06_046 crossref_primary_10_1007_s11416_024_00530_4 crossref_primary_10_1007_s10586_018_02896_9 crossref_primary_10_1049_ise2_12014 crossref_primary_10_1016_j_ins_2016_01_019 crossref_primary_10_1080_00207160_2015_1075986 |
Cites_doi | 10.1016/j.ins.2013.03.062 10.1109/TIT.1983.1056651 10.1109/18.850672 |
ContentType | Journal Article |
Copyright | 2014 Elsevier B.V. Copyright Elsevier Sequoia S.A. Jun 2014 |
Copyright_xml | – notice: 2014 Elsevier B.V. – notice: Copyright Elsevier Sequoia S.A. Jun 2014 |
DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1016/j.ipl.2014.01.008 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts Computer and Information Systems Abstracts |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1872-6119 |
EndPage | 303 |
ExternalDocumentID | 3248029111 10_1016_j_ipl_2014_01_008 S0020019014000179 |
Genre | Feature |
GrantInformation_xml | – fundername: Managing Authority for the Sectoral Operational Programme for Human Resources Development grantid: POSDRU/CPP 107/DMI 1.5/S/78342 |
GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1RT 1~. 1~5 29I 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABEFU ABFNM ABFSI ABJNI ABMAC ABTAH ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD AEBSH AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC CS3 DU5 E.L EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q G8K GBLVA GBOLZ HLZ HMJ HVGLF HZ~ IHE J1W KOM LG9 M26 M41 MO0 MS~ O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG ROL RPZ SBC SDF SDG SDP SES SEW SME SPC SPCBC SSV SSZ T5K TN5 UQL WH7 WUQ XPP ZMT ZY4 ~G- AATTM AAXKI AAYWO AAYXX ABDPE ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD 7SC 8FD AFXIZ AGCQF AGRNS JQ2 L7M L~C L~D SSH |
ID | FETCH-LOGICAL-c358t-19e5ffeb7f6dcd87fab96793f15bf25153bcd38b591030b9b759b5491110931a3 |
IEDL.DBID | .~1 |
ISSN | 0020-0190 |
IngestDate | Sun Sep 28 06:39:30 EDT 2025 Sun Jul 13 03:47:14 EDT 2025 Thu Apr 24 23:09:46 EDT 2025 Thu Sep 25 00:50:38 EDT 2025 Fri Feb 23 02:16:28 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 6 |
Keywords | Entropy (Asymptotic) idealness Secret sharing scheme Cryptography Chinese Remainder Theorem (Asymptotic) perfectness |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c358t-19e5ffeb7f6dcd87fab96793f15bf25153bcd38b591030b9b759b5491110931a3 |
Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-2 content type line 23 |
ORCID | 0000-0002-4033-9880 |
PQID | 1507808795 |
PQPubID | 45522 |
PageCount | 5 |
ParticipantIDs | proquest_miscellaneous_1531029586 proquest_journals_1507808795 crossref_primary_10_1016_j_ipl_2014_01_008 crossref_citationtrail_10_1016_j_ipl_2014_01_008 elsevier_sciencedirect_doi_10_1016_j_ipl_2014_01_008 |
PublicationCentury | 2000 |
PublicationDate | June 2014 2014-06-00 20140601 |
PublicationDateYYYYMMDD | 2014-06-01 |
PublicationDate_xml | – month: 06 year: 2014 text: June 2014 |
PublicationDecade | 2010 |
PublicationPlace | Amsterdam |
PublicationPlace_xml | – name: Amsterdam |
PublicationTitle | Information processing letters |
PublicationYear | 2014 |
Publisher | Elsevier B.V Elsevier Sequoia S.A |
Publisher_xml | – name: Elsevier B.V – name: Elsevier Sequoia S.A |
References | Asmuth, Bloom (br0010) 1983; 29 Goldreich, Ron, Sudan (br0030) 2000; 46 Barzu, Ţiplea, Drăgan (br0050) 2013; 240 Quisquater, Preneel, Vandewalle (br0040) 2002; vol. 2274 Mignotte (br0020) 1982; vol. 149 Ding, Pei, Salomaa (br0060) 1996 Goldreich (10.1016/j.ipl.2014.01.008_br0030) 2000; 46 Quisquater (10.1016/j.ipl.2014.01.008_br0040) 2002; vol. 2274 Ding (10.1016/j.ipl.2014.01.008_br0060) 1996 Asmuth (10.1016/j.ipl.2014.01.008_br0010) 1983; 29 Barzu (10.1016/j.ipl.2014.01.008_br0050) 2013; 240 Mignotte (10.1016/j.ipl.2014.01.008_br0020) 1982; vol. 149 |
References_xml | – year: 1996 ident: br0060 article-title: Chinese Remainder Theorem. Applications in Computing, Coding, Cryptography – volume: 240 start-page: 161 year: 2013 end-page: 172 ident: br0050 article-title: Compact sequences of co-primes and their applications to the security of CRT-based threshold schemes publication-title: Inf. Sci. – volume: 29 start-page: 208 year: 1983 end-page: 210 ident: br0010 article-title: A modular approach to key safeguarding publication-title: IEEE Trans. Inf. Theory – volume: vol. 149 start-page: 371 year: 1982 end-page: 375 ident: br0020 article-title: How to share a secret? publication-title: Workshop on Cryptography – volume: vol. 2274 start-page: 199 year: 2002 end-page: 210 ident: br0040 article-title: On the security of the threshold scheme based on the Chinese remainder theorem publication-title: Public Key Cryptography – volume: 46 start-page: 1330 year: 2000 end-page: 1338 ident: br0030 article-title: Chinese remaindering with errors publication-title: IEEE Trans. Inf. Theory – volume: vol. 2274 start-page: 199 year: 2002 ident: 10.1016/j.ipl.2014.01.008_br0040 article-title: On the security of the threshold scheme based on the Chinese remainder theorem – year: 1996 ident: 10.1016/j.ipl.2014.01.008_br0060 – volume: 240 start-page: 161 year: 2013 ident: 10.1016/j.ipl.2014.01.008_br0050 article-title: Compact sequences of co-primes and their applications to the security of CRT-based threshold schemes publication-title: Inf. Sci. doi: 10.1016/j.ins.2013.03.062 – volume: 29 start-page: 208 issue: 2 year: 1983 ident: 10.1016/j.ipl.2014.01.008_br0010 article-title: A modular approach to key safeguarding publication-title: IEEE Trans. Inf. Theory doi: 10.1109/TIT.1983.1056651 – volume: 46 start-page: 1330 issue: 4 year: 2000 ident: 10.1016/j.ipl.2014.01.008_br0030 article-title: Chinese remaindering with errors publication-title: IEEE Trans. Inf. Theory doi: 10.1109/18.850672 – volume: vol. 149 start-page: 371 year: 1982 ident: 10.1016/j.ipl.2014.01.008_br0020 article-title: How to share a secret? |
SSID | ssj0006437 |
Score | 2.0817401 |
Snippet | The study of the asymptotic idealness of the Goldreich–Ron–Sudan (GRS, for short) threshold secret sharing scheme was the subject of several research papers,... The study of the asymptotic idealness of the Goldreich-Ron-Sudan (GRS, for short) threshold secret sharing scheme was the subject of several research papers,... |
SourceID | proquest crossref elsevier |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 299 |
SubjectTerms | (Asymptotic) idealness (Asymptotic) perfectness Asymptotic methods Asymptotic properties Chinese Remainder Theorem Cryptography Data processing Entropy Information sharing Probability distribution Scientific papers Secret sharing scheme Studies Thresholds |
Title | A necessary and sufficient condition for the asymptotic idealness of the GRS threshold secret sharing scheme |
URI | https://dx.doi.org/10.1016/j.ipl.2014.01.008 https://www.proquest.com/docview/1507808795 https://www.proquest.com/docview/1531029586 |
Volume | 114 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
journalDatabaseRights | – providerCode: PRVESC databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier) customDbUrl: eissn: 1872-6119 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0006437 issn: 0020-0190 databaseCode: GBLVA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Complete Freedom Collection [SCCMFC] customDbUrl: eissn: 1872-6119 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0006437 issn: 0020-0190 databaseCode: ACRLP dateStart: 19950113 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection customDbUrl: eissn: 1872-6119 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0006437 issn: 0020-0190 databaseCode: .~1 dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals [SCFCJ] customDbUrl: eissn: 1872-6119 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0006437 issn: 0020-0190 databaseCode: AIKHN dateStart: 19950113 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVLSH databaseName: Elsevier Journals customDbUrl: mediaType: online eissn: 1872-6119 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0006437 issn: 0020-0190 databaseCode: AKRWK dateStart: 19930125 isFulltext: true providerName: Library Specific Holdings |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV09T8MwELUQLCx8IwoFGYkJKdAQO4nHqqIUEAxAJTbLTmxR1CYRSQcWfjt3TlIEQgxMkWMnsc72-V3u-Y6QEw7zQLOUeSZUgcd8HXuKKespP4FCxG0Y49nhu_twNGY3z_x5iQzaszBIq2x0f63TnbZu7pw30jwvJhM844t8IHQDuqgveIgPo3_BnD77-KJ5oGOqpnkgAUssPJuO4zUp0PvgMxe5EzNM_r43_dDSbusZbpC1BjPSft2tTbJksi2y3uZjoM3y3CbTPs0M0v7V2ztVWUrLuQsQAfsKBbM3dewsCiiVAuqjqnyfFVUO76STFOAi6jyaW1d39fAIV7DE0TlFS4SWFS1fFP4EpGAPm5nZIePh5dNg5DXZFLwk4HHl-cJwa42ObJgmaRxZpUUIq9P6XFtAOTzQSRrEmgvMPKYFDJTQYD36GJM08FWwS5azPDN7hAoj4lQLGylhmYEuaiVCE9lEMMwgYzuk18pRJk2occx4MZUtp-xVguglil72fAmi75DTxSNFHWfjr8asHRz5bbJI2Af-eqzbDqRsVmopERDHPUy53iHHi2pYY-g4UZnJ59gGQPCF4HG4_78vH5BVLNUUsy5Zrt7m5hDATKWP3Gw9Iiv969vR_Ser5_S0 |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3LS_QwEB_81oNefIvrM4Inobi1SdscF1HX1x58gLeQtAmuaHex3YP_vTNtuqCIh-9U2iRtmCST33R-mQE4EjgPDM95YGMdBTw0aaC5doEOM7xJhItTOjt8N4wHT_z6WTzPwVl7FoZolV73Nzq91tb-yYmX5slkNKIzvsQHIjdgHfVF_oN5LlAnd2C-f3UzGM4UMvmmGqYHcbDkzLlZ07xGE3JAhLwO3klJJn_fnn4o6nr3uViBJQ8bWb_p2SrM2WINltuUDMyv0HV467PCEvNff3wyXeSsnNYxInBrYWj55jVBiyFQZQj8mC4_3yfVGN_JRjkiRlJ7bOzqssv7B7yiMU7-KVYSuqxY-aLpPyBDk9i-2w14ujh_PBsEPqFCkEUirYJQWuGcNYmL8yxPE6eNjHGBulAYh0BHRCbLo9QIScnHjMSxkgYNyJDCkkahjjahU4wLuwVMWpnmRrpES8ctdtFoGdvEZZJTEhnXhV4rR5X5aOOU9OJNtbSyV4WiVyR61QsVir4Lx7MmkybUxl-VeTs46tt8UbgV_NVstx1I5RdrqQgTpz3Kut6Fw1kxLjPynejCjqdUB3HwqRRpvP1_Xz6AhcHj3a26vRre7MAilTSMs13oVB9Tu4fYpjL7fu5-AfwW918 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+necessary+and+sufficient+condition+for+the+asymptotic+idealness+of+the+GRS+threshold+secret+sharing+scheme&rft.jtitle=Information+processing+letters&rft.au=Tiplea%2C+Ferucio+Laurentiu&rft.au=Dragan%2C+Constantin+Catalin&rft.date=2014-06-01&rft.pub=Elsevier+Sequoia+S.A&rft.issn=0020-0190&rft.eissn=1872-6119&rft.volume=114&rft.issue=6&rft.spage=299&rft_id=info:doi/10.1016%2Fj.ipl.2014.01.008&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=3248029111 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0020-0190&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0020-0190&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0020-0190&client=summon |