Data sharing based on error-correcting codes
DOI:
https://doi.org/10.18372/2225-5036.22.11097Keywords:
secret sharing, threshold scheme, Shamir scheme, error-correcting codes, Hamming codeAbstract
Secret sharing protocols are used for distributed storing of information. Most often such information are secret keys or passwords of any user. Secret sharing protocols are designed to solve the problem of storing information so that those groups of people, who are allowed to know the secret, can restore the secret, and those groups that are not allowed to know the secret, are not able to recover even by brute-force. More popular threshold secret sharing scheme is Shamir’s distribution scheme. The idea of Shamir's scheme is the fact that for the interpolation polynomial of degree k-1, k points are required. Shamir’s sharing scheme was originally designed for distribution of secret keys. For large amounts of data, sharing and restore processes are very slow. Thus, it is necessary to have a faster threshold secret sharing scheme. Since the secret scheme is based on the redundant information, and error-correcting codes provide redundancy, the idea was came to build a distribution scheme based on these codes. This article describes a new system of secret sharing on the basis of error-correcting codes. The purpose of the study is to develop a high-performance system which will use a different error-correcting code.
References
Шнайер Б. Прикладная криптография / Шнайер Б. // М.: Издательство ТРИУМФ, 2003. – С. 17-29.
Peterson W.W. Error-Correcting Codes / Peterson W.W., Weldon E,J. // The Massachusetts Institute of Technology, Second Edition – 1972 – P. 301-350.
Assmus E.F. Designs and Their codes / Assmus E.F., Key J.D. // Cambridge University Press – 1992. – P. 264-270.
Bose, R. On A Class of Error Correcting Bina-ry Group Codes / Bose, R., C., Ray-Chaudhuri // D. K., Information and Control V.3 – 1960. – P. 68-79.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Ukrainian Scientific Journal of Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Ukrainian Scientific Journal of Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.