Contents
Pagebreaks of the print version
CODE BASED SECRET
SHARING SCHEMES
Applied Combinatorial Coding Theory
CODE BASED SECRET
SHARING SCHEMES
Applied Combinatorial Coding Theory
Selda alkavur
Kocaeli University, Turkey
Alexis Bonnecaze
University of Aix-Marseille, France
Romar dela Cruz
University of the Philippines Diliman, Philippines
Patrick Sol
University of Aix-Marseille, France
Published by
World Scientific Publishing Co. Pte. Ltd.
5 Toh Tuck Link, Singapore 596224
USA office: 27 Warren Street, Suite 401-402, Hackensack, NJ 07601
UK office: 57 Shelton Street, Covent Garden, London WC2H 9HE
Library of Congress Control Number: 2022011655
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library.
CODE BASED SECRET SHARING SCHEMES
Applied Combinatorial Coding Theory
Copyright 2022 by World Scientific Publishing Co. Pte. Ltd.
All rights reserved. This book, or parts thereof, may not be reproduced in any form or by any means, electronic or mechanical, including photocopying, recording or any information storage and retrieval system now known or to be invented, without written permission from the publisher.
For photocopying of material in this volume, please pay a copying fee through the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, USA. In this case permission to photocopy is not required from the publisher.
ISBN 978-981-124-832-0 (hardcover)
ISBN 978-981-124-833-7 (ebook for institutions)
ISBN 978-981-124-834-4 (ebook for individuals)
For any available supplementary material, please visit
https://www.worldscientific.com/worldscibooks/10.1142/12585#t=suppl
Desk Editors: Vishnu Mohan/Rok Ting Tan
Typeset by Stallion Press
Email:
Printed in Singapore
Foreword
I am very happy that my colleagues from ATI team at Institut de Mathmatiques de Marseille (I2M), Alexis Bonnecaze and Patrick Sol, asked me to write a foreword their book on Code-Based Secret Sharing Schemes (SSS).
Both Alexis and Patrick are experts in Coding Theory, with a lifelong interest in cryptography. To speak about their two coauthors: Selda is a young Turkish cryptographer, and Romar is a young mathematician from Manila.
The book focuses on the interplay between Coding Theory and SSS. While the first and most popular SSS (Shamir scheme) was written in the language of polynomial interpolation over finite fields, it transpired soon that it was in fact related to Reed Solomon codes, the most famous class of codes after the Hamming codes. In subsequent years, research developed in several directions related to combinatorics of codes and designs. The concept of minimal code is an example related to Massey scheme. There are also some application to the so-called real world-like image processing.
The book collects classical applications and gives some examples of research related to the authors practice. I recommend it as a friendly introduction to a domain at the crossroads of mathematics, computer science and engineering.
Marseilles July 24th 2021 | Robert Rolland Emeritus Professor at Aix-Marseille University President of ACRYPTA |
Preface
A pirate wants to disclose the secret of a treasure location to his crew. To avoid that the greedy sailors compete and fight for the secret, he dissects the map of the location into several pieces, and gives a piece to each crew member. One single piece of the map is not enough to locate the treasure. Several pieces are needed to find it. This small tale is a toy example of a secret-sharing scheme.
Secret-sharing schemes form one of the most important topic in Cryptography. These protocols are used in many areas, applied mathematics, computer science, engineering, etc. A secret-sharing scheme is an encryption method. A secret s is divided into n pieces called shares. Each piece has no information about the secret, but it is retrieved by a specified of combination of these pieces. Specifically, a secret-sharing scheme is called a (k, n)-threshold scheme if the following property holds. Any k out of n pieces can reach the secret s but k 1 or fewer pieces have no information about s. The k elements that are capable of recovering the secret are called minimal access elements. A central entity, called the dealer, distributes the pieces to the participants. This distribution phase constitutes the first step of the protocol. In a second step, the recovery phase, coalitions of participants can pool their respective shares, and, if they are authorized, run an algebraic algorithm to reconstruct the secret.
Secret-sharing schemes were introduced independently by Shamir [].
The aim of this book is twofold. First, we give a self-contained exposition of these classical protocols, and their various generalizations. This is the topic of .
References
[]A. Alahmadi, A. Altassan, A. AlKenani, S. alkavur, H. Shoaib and P. Sol. A multisecret-sharing scheme based on LCD codes. Mathematics, 8:272, 2020.
[]A. Alahmadi, R.E.L. Aldred, R. dela Cruz, P. Sol and C. Thomassen. The maximum number of minimal codewords in long codes. Discret. Appl. Math. 161(3):424429, 2013.
[3]A. Alahmadi, R.E.L. Aldred, R. dela Cruz, P. Sol and C. Thomassen. The maximum number of minimal codewords in an [n, k]-code. Discret. Math. 313(15):15691574, 2013.
[]A. Alahmadi, R.E.L. Aldred, R. dela Cruz, S. Ok, P. Sol and C. Thomassen. The minimum number of minimal codewords in an [n, k]-code and in graphic codes. Discret. Appl. Math., 184:3239, 2015.
[]A. Bonnecaze and A. Gabillon. On key distribution in MANETs. In SITIS, pp. 363368, 2009.
[]G.R. Blakley. Safeguarding cryptographic keys. In AFIPS 1979 Nat. Computer Conf., Vol. 48, pp. 313317, 1979.
[]D.-P. Le, A. Bonnecaze and A. Gabillon. A secure round-based times-tamping scheme. In ICISS08, 2008.
]S. alkavur. Secret-sharing schemes and syndrome decoding. J. Math. Statist. Sci., 2016:741750, 2016.
[]S. alkavur and F. Molla. The Blakley based secret sharing approach. Sigma J. Eng. Natural Sci., 37(2):489494, 2019.
[10]S. alkavur. Some secret sharing schemes based on the finite fields. Comput. Technol. Appl., 7:269272, 2016, doi: 10.17265/1934-7332/2016.06.001.
[11]S. alkavur. A secret sharing scheme based on residue class ring. Appl. Math. Inform. Sci., 9(4):13, 2015.
[12]S. alkavur. A study on minimality of the codewords in the dual code of the code of a symmetric (, k, )-design. Appl. Math. Inform. Sci., 9(6):14, 2015.
[13]S. alkavur. Secret sharing schemes based on the dual code of the code of a symmetric (, k, )-design and minimal access sets. Comput. Technol. Appl., 6:95100, 2015.
[]S. alkavur and F. Molla. An image secret sharing method based on Shamir secret sharing. Current Trends Comput. Sci. Appl., 1(2):1922, 2018.
[]S. alkavur and P. Sol. Multisecret-sharing schemes and bounded distance decoding of linear codes. Int. J. Comput. Math. 94(1):107114, 2017.
[]S. alkavur and P. Sol. Some multisecret-sharing schemes over finite fields.