March 8, 2023, 2:42 p.m. |

IACR News www.iacr.org

ePrint Report: Secret Sharing Scheme with Perfect Concealment

Izumi Takeuti, Tomoko Adachi


In 1979, Shamir and Blakley introduced secret sharing schemes to provide both security and reliability.
In this study, we construct two secret sharing schemes with perfect concealment.
The first is an \((n,n)\)-threshold scheme by a group.
Although the scheme itself is already known, we prove that its concealment is perfect.
We propose the second as a new \((2,n)\)-threshold scheme by a quasigroup.

concealment eprint report perfect prove reliability report secret security sharing study

Cybersecurity Engineer III

@ Hexagon US Federal | Huntsville, AL

Cybersecurity Technical Advisor

@ Microsoft | Reading, Berkshire, United Kingdom

Cybersecurity Engineer

@ Mindvalley | Kuala Lumpur, Kuala Lumpur, Malaysia

Network Security (Meraki) Infrastructure Lead

@ Sopra Steria | Noida, Uttar Pradesh, India

Sr. Director, Product Security

@ Ro | New York City or Remote

Senior Research Engineer, Cryptography (PhD Entry Level)

@ Seagate Technology | Shakopee, MN, US