A necessary and sufficient condition for the asymptotic idealness of the GRS threshold secret sharing scheme

The study of the asymptotic idealness of the Goldreich–Ron–Sudan (GRS, for short) threshold secret sharing scheme was the subject of several research papers, where sufficient conditions were provided. In this paper a necessary and sufficient condition is established; namely, it is shown that the GRS...

Full description

Saved in:
Bibliographic Details
Published inInformation processing letters Vol. 114; no. 6; pp. 299 - 303
Main Authors Tiplea, Ferucio Laurentiu, Dragan, Constantin Catalin
Format Journal Article
LanguageEnglish
Published Amsterdam Elsevier B.V 01.06.2014
Elsevier Sequoia S.A
Subjects
Online AccessGet full text
ISSN0020-0190
1872-6119
DOI10.1016/j.ipl.2014.01.008

Cover

Abstract The study of the asymptotic idealness of the Goldreich–Ron–Sudan (GRS, for short) threshold secret sharing scheme was the subject of several research papers, where sufficient conditions were provided. In this paper a necessary and sufficient condition is established; namely, it is shown that the GRS threshold secret sharing scheme is asymptotically ideal under the uniform distribution on the secret space if and only if it is based on 1-compact sequences of co-primes. •Previous results regarding the security of the GRS secret sharing scheme are improved.•The GRS scheme is asymptotically ideal iff it is based on 1-compact sequences of co-primes.•The asymptotic idealness issue of the GRS scheme is completely closed.•The importance of 1-compact sequences of co-primes is emphasized.
AbstractList The study of the asymptotic idealness of the Goldreich-Ron-Sudan (GRS, for short) threshold secret sharing scheme was the subject of several research papers, where sufficient conditions were provided. In this paper a necessary and sufficient condition is established; namely, it is shown that the GRS threshold secret sharing scheme is asymptotically ideal under the uniform distribution on the secret space if and only if it is based on 1-compact sequences of co-primes. [PUBLICATION ABSTRACT]
The study of the asymptotic idealness of the Goldreich–Ron–Sudan (GRS, for short) threshold secret sharing scheme was the subject of several research papers, where sufficient conditions were provided. In this paper a necessary and sufficient condition is established; namely, it is shown that the GRS threshold secret sharing scheme is asymptotically ideal under the uniform distribution on the secret space if and only if it is based on 1-compact sequences of co-primes. •Previous results regarding the security of the GRS secret sharing scheme are improved.•The GRS scheme is asymptotically ideal iff it is based on 1-compact sequences of co-primes.•The asymptotic idealness issue of the GRS scheme is completely closed.•The importance of 1-compact sequences of co-primes is emphasized.
The study of the asymptotic idealness of the Goldreich-Ron-Sudan (GRS, for short) threshold secret sharing scheme was the subject of several research papers, where sufficient conditions were provided. In this paper a necessary and sufficient condition is established; namely, it is shown that the GRS threshold secret sharing scheme is asymptotically ideal under the uniform distribution on the secret space if and only if it is based on 1-compact sequences of co-primes.
Author Ţiplea, Ferucio Laurenţiu
Drăgan, Constantin Cătălin
Author_xml – sequence: 1
  givenname: Ferucio
  surname: Tiplea
  middlename: Laurentiu
  fullname: Tiplea, Ferucio Laurentiu
– sequence: 2
  givenname: Constantin
  surname: Dragan
  middlename: Catalin
  fullname: Dragan, Constantin Catalin
BookMark eNp9kbFqHDEQhoVxIGcnD5BOkCbNrmd2T6sVqYxJnIDBkNi10GpHPh170kXSBfz21uVSuXA1xfzfz_DNBTsPMRBjnxBaBByutq3fL20HuG4BW4DxjK1wlF0zIKpztgLooAFU8J5d5LwFgGHdyxVbrnkgSzmb9MxNmHk-OOetp1C4jWH2xcfAXUy8bIib_Lzbl1i85X4ms4QK8uj-7W5__a4zUd7EpdaQTVR43pjkwxPPdkM7-sDeObNk-vh_XrLH798ebn40d_e3P2-u7xrbi7E0qEg4R5N0w2znUTozqUGq3qGYXCdQ9JOd-3ESCqGHSU1SqEmsFSKC6tH0l-zLqXef4p8D5aJ3PltaFhMoHrKuDQidEuNQo59fRbfxkEK9rqZAjjBKJWoKTymbYs6JnN4nv6vKNII--tdbXf3ro38NqKv_yshXjPXFHHWWZPzyJvn1RFJ19NdT0vn4EEuzT2SLnqN_g34BwayiKg
CODEN IFPLAT
CitedBy_id crossref_primary_10_1016_j_ins_2018_06_046
crossref_primary_10_1007_s11416_024_00530_4
crossref_primary_10_1007_s10586_018_02896_9
crossref_primary_10_1049_ise2_12014
crossref_primary_10_1016_j_ins_2016_01_019
crossref_primary_10_1080_00207160_2015_1075986
Cites_doi 10.1016/j.ins.2013.03.062
10.1109/TIT.1983.1056651
10.1109/18.850672
ContentType Journal Article
Copyright 2014 Elsevier B.V.
Copyright Elsevier Sequoia S.A. Jun 2014
Copyright_xml – notice: 2014 Elsevier B.V.
– notice: Copyright Elsevier Sequoia S.A. Jun 2014
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1016/j.ipl.2014.01.008
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts

Computer and Information Systems Abstracts
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-6119
EndPage 303
ExternalDocumentID 3248029111
10_1016_j_ipl_2014_01_008
S0020019014000179
Genre Feature
GrantInformation_xml – fundername: Managing Authority for the Sectoral Operational Programme for Human Resources Development
  grantid: POSDRU/CPP 107/DMI 1.5/S/78342
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1RT
1~.
1~5
29I
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABEFU
ABFNM
ABFSI
ABJNI
ABMAC
ABTAH
ABXDB
ABYKQ
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
AEBSH
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BKOMP
BLXMC
CS3
DU5
E.L
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
G8K
GBLVA
GBOLZ
HLZ
HMJ
HVGLF
HZ~
IHE
J1W
KOM
LG9
M26
M41
MO0
MS~
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
RIG
ROL
RPZ
SBC
SDF
SDG
SDP
SES
SEW
SME
SPC
SPCBC
SSV
SSZ
T5K
TN5
UQL
WH7
WUQ
XPP
ZMT
ZY4
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABDPE
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
7SC
8FD
AFXIZ
AGCQF
AGRNS
JQ2
L7M
L~C
L~D
SSH
ID FETCH-LOGICAL-c358t-19e5ffeb7f6dcd87fab96793f15bf25153bcd38b591030b9b759b5491110931a3
IEDL.DBID .~1
ISSN 0020-0190
IngestDate Sun Sep 28 06:39:30 EDT 2025
Sun Jul 13 03:47:14 EDT 2025
Thu Apr 24 23:09:46 EDT 2025
Thu Sep 25 00:50:38 EDT 2025
Fri Feb 23 02:16:28 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 6
Keywords Entropy
(Asymptotic) idealness
Secret sharing scheme
Cryptography
Chinese Remainder Theorem
(Asymptotic) perfectness
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c358t-19e5ffeb7f6dcd87fab96793f15bf25153bcd38b591030b9b759b5491110931a3
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-2
content type line 23
ORCID 0000-0002-4033-9880
PQID 1507808795
PQPubID 45522
PageCount 5
ParticipantIDs proquest_miscellaneous_1531029586
proquest_journals_1507808795
crossref_primary_10_1016_j_ipl_2014_01_008
crossref_citationtrail_10_1016_j_ipl_2014_01_008
elsevier_sciencedirect_doi_10_1016_j_ipl_2014_01_008
PublicationCentury 2000
PublicationDate June 2014
2014-06-00
20140601
PublicationDateYYYYMMDD 2014-06-01
PublicationDate_xml – month: 06
  year: 2014
  text: June 2014
PublicationDecade 2010
PublicationPlace Amsterdam
PublicationPlace_xml – name: Amsterdam
PublicationTitle Information processing letters
PublicationYear 2014
Publisher Elsevier B.V
Elsevier Sequoia S.A
Publisher_xml – name: Elsevier B.V
– name: Elsevier Sequoia S.A
References Asmuth, Bloom (br0010) 1983; 29
Goldreich, Ron, Sudan (br0030) 2000; 46
Barzu, Ţiplea, Drăgan (br0050) 2013; 240
Quisquater, Preneel, Vandewalle (br0040) 2002; vol. 2274
Mignotte (br0020) 1982; vol. 149
Ding, Pei, Salomaa (br0060) 1996
Goldreich (10.1016/j.ipl.2014.01.008_br0030) 2000; 46
Quisquater (10.1016/j.ipl.2014.01.008_br0040) 2002; vol. 2274
Ding (10.1016/j.ipl.2014.01.008_br0060) 1996
Asmuth (10.1016/j.ipl.2014.01.008_br0010) 1983; 29
Barzu (10.1016/j.ipl.2014.01.008_br0050) 2013; 240
Mignotte (10.1016/j.ipl.2014.01.008_br0020) 1982; vol. 149
References_xml – year: 1996
  ident: br0060
  article-title: Chinese Remainder Theorem. Applications in Computing, Coding, Cryptography
– volume: 240
  start-page: 161
  year: 2013
  end-page: 172
  ident: br0050
  article-title: Compact sequences of co-primes and their applications to the security of CRT-based threshold schemes
  publication-title: Inf. Sci.
– volume: 29
  start-page: 208
  year: 1983
  end-page: 210
  ident: br0010
  article-title: A modular approach to key safeguarding
  publication-title: IEEE Trans. Inf. Theory
– volume: vol. 149
  start-page: 371
  year: 1982
  end-page: 375
  ident: br0020
  article-title: How to share a secret?
  publication-title: Workshop on Cryptography
– volume: vol. 2274
  start-page: 199
  year: 2002
  end-page: 210
  ident: br0040
  article-title: On the security of the threshold scheme based on the Chinese remainder theorem
  publication-title: Public Key Cryptography
– volume: 46
  start-page: 1330
  year: 2000
  end-page: 1338
  ident: br0030
  article-title: Chinese remaindering with errors
  publication-title: IEEE Trans. Inf. Theory
– volume: vol. 2274
  start-page: 199
  year: 2002
  ident: 10.1016/j.ipl.2014.01.008_br0040
  article-title: On the security of the threshold scheme based on the Chinese remainder theorem
– year: 1996
  ident: 10.1016/j.ipl.2014.01.008_br0060
– volume: 240
  start-page: 161
  year: 2013
  ident: 10.1016/j.ipl.2014.01.008_br0050
  article-title: Compact sequences of co-primes and their applications to the security of CRT-based threshold schemes
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2013.03.062
– volume: 29
  start-page: 208
  issue: 2
  year: 1983
  ident: 10.1016/j.ipl.2014.01.008_br0010
  article-title: A modular approach to key safeguarding
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/TIT.1983.1056651
– volume: 46
  start-page: 1330
  issue: 4
  year: 2000
  ident: 10.1016/j.ipl.2014.01.008_br0030
  article-title: Chinese remaindering with errors
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/18.850672
– volume: vol. 149
  start-page: 371
  year: 1982
  ident: 10.1016/j.ipl.2014.01.008_br0020
  article-title: How to share a secret?
SSID ssj0006437
Score 2.0817401
Snippet The study of the asymptotic idealness of the Goldreich–Ron–Sudan (GRS, for short) threshold secret sharing scheme was the subject of several research papers,...
The study of the asymptotic idealness of the Goldreich-Ron-Sudan (GRS, for short) threshold secret sharing scheme was the subject of several research papers,...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 299
SubjectTerms (Asymptotic) idealness
(Asymptotic) perfectness
Asymptotic methods
Asymptotic properties
Chinese Remainder Theorem
Cryptography
Data processing
Entropy
Information sharing
Probability distribution
Scientific papers
Secret sharing scheme
Studies
Thresholds
Title A necessary and sufficient condition for the asymptotic idealness of the GRS threshold secret sharing scheme
URI https://dx.doi.org/10.1016/j.ipl.2014.01.008
https://www.proquest.com/docview/1507808795
https://www.proquest.com/docview/1531029586
Volume 114
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier)
  customDbUrl:
  eissn: 1872-6119
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0006437
  issn: 0020-0190
  databaseCode: GBLVA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Complete Freedom Collection [SCCMFC]
  customDbUrl:
  eissn: 1872-6119
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0006437
  issn: 0020-0190
  databaseCode: ACRLP
  dateStart: 19950113
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection
  customDbUrl:
  eissn: 1872-6119
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0006437
  issn: 0020-0190
  databaseCode: .~1
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals [SCFCJ]
  customDbUrl:
  eissn: 1872-6119
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0006437
  issn: 0020-0190
  databaseCode: AIKHN
  dateStart: 19950113
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  customDbUrl:
  mediaType: online
  eissn: 1872-6119
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0006437
  issn: 0020-0190
  databaseCode: AKRWK
  dateStart: 19930125
  isFulltext: true
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV09T8MwELUQLCx8IwoFGYkJKdAQO4nHqqIUEAxAJTbLTmxR1CYRSQcWfjt3TlIEQgxMkWMnsc72-V3u-Y6QEw7zQLOUeSZUgcd8HXuKKespP4FCxG0Y49nhu_twNGY3z_x5iQzaszBIq2x0f63TnbZu7pw30jwvJhM844t8IHQDuqgveIgPo3_BnD77-KJ5oGOqpnkgAUssPJuO4zUp0PvgMxe5EzNM_r43_dDSbusZbpC1BjPSft2tTbJksi2y3uZjoM3y3CbTPs0M0v7V2ztVWUrLuQsQAfsKBbM3dewsCiiVAuqjqnyfFVUO76STFOAi6jyaW1d39fAIV7DE0TlFS4SWFS1fFP4EpGAPm5nZIePh5dNg5DXZFLwk4HHl-cJwa42ObJgmaRxZpUUIq9P6XFtAOTzQSRrEmgvMPKYFDJTQYD36GJM08FWwS5azPDN7hAoj4lQLGylhmYEuaiVCE9lEMMwgYzuk18pRJk2occx4MZUtp-xVguglil72fAmi75DTxSNFHWfjr8asHRz5bbJI2Af-eqzbDqRsVmopERDHPUy53iHHi2pYY-g4UZnJ59gGQPCF4HG4_78vH5BVLNUUsy5Zrt7m5hDATKWP3Gw9Iiv969vR_Ser5_S0
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3LS_QwEB_81oNefIvrM4Inobi1SdscF1HX1x58gLeQtAmuaHex3YP_vTNtuqCIh-9U2iRtmCST33R-mQE4EjgPDM95YGMdBTw0aaC5doEOM7xJhItTOjt8N4wHT_z6WTzPwVl7FoZolV73Nzq91tb-yYmX5slkNKIzvsQHIjdgHfVF_oN5LlAnd2C-f3UzGM4UMvmmGqYHcbDkzLlZ07xGE3JAhLwO3klJJn_fnn4o6nr3uViBJQ8bWb_p2SrM2WINltuUDMyv0HV467PCEvNff3wyXeSsnNYxInBrYWj55jVBiyFQZQj8mC4_3yfVGN_JRjkiRlJ7bOzqssv7B7yiMU7-KVYSuqxY-aLpPyBDk9i-2w14ujh_PBsEPqFCkEUirYJQWuGcNYmL8yxPE6eNjHGBulAYh0BHRCbLo9QIScnHjMSxkgYNyJDCkkahjjahU4wLuwVMWpnmRrpES8ctdtFoGdvEZZJTEhnXhV4rR5X5aOOU9OJNtbSyV4WiVyR61QsVir4Lx7MmkybUxl-VeTs46tt8UbgV_NVstx1I5RdrqQgTpz3Kut6Fw1kxLjPynejCjqdUB3HwqRRpvP1_Xz6AhcHj3a26vRre7MAilTSMs13oVB9Tu4fYpjL7fu5-AfwW918
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+necessary+and+sufficient+condition+for+the+asymptotic+idealness+of+the+GRS+threshold+secret+sharing+scheme&rft.jtitle=Information+processing+letters&rft.au=Tiplea%2C+Ferucio+Laurentiu&rft.au=Dragan%2C+Constantin+Catalin&rft.date=2014-06-01&rft.pub=Elsevier+Sequoia+S.A&rft.issn=0020-0190&rft.eissn=1872-6119&rft.volume=114&rft.issue=6&rft.spage=299&rft_id=info:doi/10.1016%2Fj.ipl.2014.01.008&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=3248029111
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0020-0190&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0020-0190&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0020-0190&client=summon