Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

The Latin squares and the secret sharing schemes

The Latin squares and the secret sharing schemes Abstract The Latin square is a good candidate in a secret sharing scheme to represent a secret, because of the huge number of the Latin squares for a reasonably large order. This makes outsiders difficult to discover the secret due to tremendous possibilities. We can improve the efficiency by distributing the shares of the critical set, instead of the full Latin square, to the participants. By different critical sets of the same Latin square, different secret sharing schemes can be implemented. However, finding a critical set of a large order Latin square is very difficult. This makes the implementation of Latin square based secret sharing scheme hard. We explore these limitations, then we propose to apply herding hash technique to overcome them. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Groups - Complexity - Cryptology de Gruyter

The Latin squares and the secret sharing schemes

Loading next page...
 
/lp/de-gruyter/the-latin-squares-and-the-secret-sharing-schemes-p3le5K0AU5
Publisher
de Gruyter
Copyright
Copyright © 2010 by the
ISSN
1867-1144
eISSN
1869-6104
DOI
10.1515/gcc.2010.011
Publisher site
See Article on Publisher Site

Abstract

Abstract The Latin square is a good candidate in a secret sharing scheme to represent a secret, because of the huge number of the Latin squares for a reasonably large order. This makes outsiders difficult to discover the secret due to tremendous possibilities. We can improve the efficiency by distributing the shares of the critical set, instead of the full Latin square, to the participants. By different critical sets of the same Latin square, different secret sharing schemes can be implemented. However, finding a critical set of a large order Latin square is very difficult. This makes the implementation of Latin square based secret sharing scheme hard. We explore these limitations, then we propose to apply herding hash technique to overcome them.

Journal

Groups - Complexity - Cryptologyde Gruyter

Published: Dec 1, 2010

References