Secret sharing device, method, and program

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Packet header designating cryptographically protected data

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S028000, C380S046000, C380S212000, C713S162000, C713S163000, C709S208000, C709S209000, C709S211000

Reexamination Certificate

active

08074068

ABSTRACT:
A secret sharing device of (k, n) threshold scheme creates a generator matrix G, first divided secret data, and random number data, calculates shared partial data based on the product of matrices with the random number data, the divided secret data, and the generator matrix G, and delivers the shared information formed by the shared partial data and the header information individually to the storage units. The secret sharing device calculates a recovery matrix and multiplies the shared information by the recovery matrix, hence to recover the secret information.

REFERENCES:
patent: 5485474 (1996-01-01), Rabin
patent: 5708714 (1998-01-01), Lopez et al.
patent: 5764767 (1998-06-01), Beimel et al.
patent: 6182214 (2001-01-01), Hardjono
patent: 6477254 (2002-11-01), Miyazaki et al.
patent: 2004/0148512 (2004-07-01), Park et al.
patent: 2007/0160197 (2007-07-01), Kagaya et al.
patent: 2004-213650 (2004-07-01), None
“Secret image sharing with smaller shadow images” by Ran-Zan Wang (Oct. 25, 2005); Pattern Recognition Letters; pp. 551-555; originally downloaded from http://linkinghub.elsevier.com/retrieve/pii/S0167865505002734.
“A Reliable (k, n) Image Secret Sharing Scheme” by Li Bai (2006); Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06); 6 pages; originally downloaded from http://ieeexplore.ieee.org/xpls/abs—all.jsp?arnumber=4030863&tag=1.
“A Strong Ramp Secret Sharing Scheme Using Matrix Projection” by Li Bai (2006); Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06); 5 pages; originally downloaded from http://ieeexplore.ieee.org/xpls/abs—all.jsp?arnumber=1648530.
“Constructions and Properties of k out of n Visual Secret Sharing Schemes” by Eric R. Verheul (1997); Designs, Codes and Cryptography; pp. 179-196; originally downloaded from http://portal.acm.org/citation.cfm?id=257518.
“Efficient visual secret sharing scheme for color images” by Shyong Jian Shyu (Jun. 3, 2005); Pattern Recognition; pp. 866-880; originally downloaded from http://linkinghub.elsevier.com/retrieve/pii/S0031320305002268.
“New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications” by Dario Catalano (Aug. 26, 1999); 30 pages; originally downloaded from http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.9201.
“Simple and Efficient Threshold Cryptosystem from the Gap Diffie-Hellman Group” by Joonsang Baek (2003); GLOBECOM; pp. 1491-1495; originally downloaded from http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.1717.
“Computer and Network Security—Key Escrow and Secret Sharing” by R.E. Newman (2000); 15 pages; originally downloaded from http://www.cise.ufl.edu/˜nemo/crypto/key-escrow.pdf.
“Key Escrow” by Ozalp Babaoglu (2006); 6 pages; originally downloaded from http://www.cs.unibo.it/˜babaoglu/courses/security06-07/lucidi/key-escrow.pdf.
“Linear Algebra and Its Applications—Second Edition” by David C. Lay (Mar. 1997); pp. xx, 2-4, 8, 26 (6 pages total); relevant pages converted to PDF originally from noted book.
“Implementation of Shamir's method for sharing a secret” by Charles Karney (Aug. 21, 2001); 1 page; converted to PDF originally from http://charles.karney.info/misc/secret.html.
“SSSS: Shamir's Secret Sharing Scheme—Windows port” by Alex Seidlitz (Jan. 16, 2006); 1 page; converted to PDF originally from http://www.seidlitz.ca/ssss/.
“On secret sharing systems” by Ehud Karnin et al. (1983); 7 pages; originally downloaded from http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.9203.
“Applied Cryptography—Second Edition” by Bruce Schneier (1996); pp. 528-531 (4 pages total); relevant pages converted to PDF originally from noted book.
Adi Shamir, “How to Share a Secret”, Communications of the ACM, vol. 22, No. 11, Nov. 1979, pp. 612-613.
Yoshihiro Fujii, et al., “A Fast (2,n)-Threshold Scheme and Its Application”, Proc. CSS2005, 6 pages, 2005.
Jun Kurihara, et al., “A (3,n)-Threshold Secret Sharing Scheme using XOR Operations”, Proc. SCIS2007, 2007, 6 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secret sharing device, method, and program does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secret sharing device, method, and program, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secret sharing device, method, and program will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4256578

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.