Cryptography – Particular algorithmic function encoding
Reexamination Certificate
2008-03-19
2011-12-13
Colin, Carl (Department: 2493)
Cryptography
Particular algorithmic function encoding
C380S046000, C380S212000, C713S160000, C713S162000, C713S163000, C709S208000, C709S209000, C709S211000
Reexamination Certificate
active
08077863
ABSTRACT:
A secret sharing apparatus according to the present invention is based on a (k,n)-threshold scheme with a threshold of at least 4 but is still operational with a threshold of at least 2. The secret sharing apparatus generates a generator matrix (G) of GF(2) in which any k of n column vectors are at a full rank, divides secret information into n−1 pieces to generate divided secret data (K(1), . . . , K(n−1)), generates random data (U(0,1), . . . , U(k−2,n−1)), calculates the product of matrixes of the divided secret data, the random data, and the generator matrix (G), assigns the j×(n−1)+ith column of the calculation result to sharing partial data (D(j,i)) to calculate sharing partial data (D(j,1)), generates header information (H(j)), and individually distributes n pieces of sharing information (D(0), . . . , D(n−1)) made up of the header information (H(j)) and sharing partial data (D(j,i)) to n storage apparatuses.
REFERENCES:
patent: 5485474 (1996-01-01), Rabin
patent: 5708714 (1998-01-01), Lopez et al.
patent: 5764767 (1998-06-01), Beimel et al.
patent: 6182214 (2001-01-01), Hardjono
patent: 6477254 (2002-11-01), Miyazaki et al.
patent: 2004/0148512 (2004-07-01), Park et al.
patent: 2007/0160197 (2007-07-01), Kagaya et al.
patent: 2004-213650 (2004-07-01), None
“Linear Algebra and Its Applications (Second Edition)” by David C. Lay (Mar. 1997); 486 pages.
“Secret image sharing with smaller shadow images” by Ran-Zan Wang (Oct. 25, 2005); Pattern Recognition Letters; pp. 551-555; originally downloaded from http://linkinghub.elsevier.com/retrieve/pii/S0167865505002734.
“A Reliable (k, n) Image Secret Sharing Scheme” by Li Bai (2006); Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06); 6 pages; originally downloaded from http://ieeexplore.ieee.org/xpls/abs—all.jsp?arnumber=4030863&tag=1.
“A Strong Ramp Secret Sharing Scheme Using Matrix Projection” by Li Bai (2006); Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06); 5 pages; originally downloaded from http://ieeexplore.ieee.org/xpls/abs—all.jsp?arnumber=1648530.
“Constructions and Properties of k out of n Visual Secret Sharing Schemes” by Eric R. Verheul (1997); Designs, Codes and Cryptography; pp. 179-196; originally downloaded from http://portal.acm.org/citation.cfm?id=257518.
“Efficient visual secret sharing scheme for color images” by Shyong Jian Shyu (Jun. 3, 2005); Pattern Recognition; pp. 866-880; originally downloaded from http://linkinghub.elsevier.com/retrieve/pii/S0031320305002268.
“New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications” by Dario Catalano (Aug. 26, 1999); 30 pages; originally downloaded from http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.9201.
“Simple and Efficient Threshold Cryptosystem from the Gap Diffie-Hellman Group” by Joonsang Baek (2003); GLOBECOM; pp. 1491-1495; originally downloaded from http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.1717.
“Computer and Network Security—Key Escrow and Secret Sharing” by R.E. Newman (2000); 15 pages; originally downloaded from http://www.cise.ufl.edu/˜nemo/crypto/key-escrow.pdf.
“Key Escrow” by Ozalp Babaoglu (2006); 6 pages; originally downloaded from http://www.cs.unibo.it/˜babaoglu/courses/security06-07/lucidi/key-escrow.pdf.
“Linear Algebra and It's Applications—Second Edition” by David C. Lay (Mar. 1997); pp. xx, 2-4, 8, 26 (6 pages total); relevant pages converted to PDF originally from noted book.
“Implementation of Shamir's method for sharing a secret” by Charles Karney (Aug. 21, 2001); 1 page; converted to PDF originally from http://charles.karney.info/misc/secret.html.
“SSSS: Shamir's Secret Sharing Scheme—Windows port” by Alex Seidlitz (Jan. 16, 2006); 1 page; converted to PDF originally from http://www.seidlitz.ca/ssss/.
“On secret sharing systems” by Ehud Karnin et al. (1983); 7 pages; originally downloaded from http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.9203.
“Applied Cryptography—Second Edition” by Bruce Schneier (1996); pp. 528-531 (4 pages total); relevant pages converted to PDF originally from noted book.
Adi Shamir, “How to Share a Secret”, Communications of the ACM, vol. 22, No. 11, Nov. 1979, pp. 612-613.
Yoshihiro Fujii, et al., “A Fast (2,n)-Threshold Scheme and Its Application”, Proc. CSS2005, 2005,6 pages, with English Abstract.
Jun Kurihara, et al., “A (3,n)-Threshold Secret Sharing Scheme using XOR Operations”, Proc. SCIS2007, 2007, pp. 1-6.
Fujii Yoshihiro
Hosaka Norikazu
Kato Takehisa
Tada Minako
Auger Phillip
Colin Carl
Kabushiki Kaisha Toshiba
Oblon, Spivak McClelland, Maier & Neustadt, L.L.P.
Toshiba Solutions Corporation
LandOfFree
Secret sharing apparatus, method, and program does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secret sharing apparatus, method, and program, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secret sharing apparatus, method, and program will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4300448