I have studied Sharmir's scheme as well as the multiple assignment scheme proposed by M. Ito. My question is if anyone can tell me if the following scheme is theoretically secure:
Terms:
P = set of participants
B = Access structure
A = Access set (authorised set within access structure)
t = cardinality of Access structure (|B|)
d = cardinality of Access set (|A|)
S = the secret
So the scheme is extremely inefficient in that it involves creating exactly t different (d,d) Shamir schemes, such that there will be t different randomly chosen polynomials that all share the same secret s
Edit:
So the scheme is an access structure secret sharing scheme, basically it defines certain subgroups of a group of participants that are valid and can therefore reconstruct a secret.
For instance if there was a group of people p1,p2,p3 and an access structure of {p1p2, p1p3} then only the combination of p1 and p2 or p1 and p3 should be able to uncover the secret. so p1p2 and p1p3 are valid subgroups and p2p3 is an invalid subgroup and should therefore not be able to uncover the secret.
This scheme is theoretically insecure if an invalid group can uncover any information.This includes uncovering or computing a number that is NOT S (the secret) and knowing that this number is not the secret. so if p2p3 compute their shares and find a number S' that they know is not the secret then the scheme is insecure!
Example:
Let S = 6, P = {P1,P2,P3}, B = {P1-P2,P1-P3) such that P1 and P2 can find the secret as well as P1 and P3
Now we generate 2 shamir schemes with the same secret:
f1(x) = 6 + 4x
f2(x) = 6 + 7x
so we need two shares from each scheme:
s1, s2 = (1,10) and (2,14)
s'1, s'2 = (1,13) and (2,20)
P1 gets s1 and s'2
P2 gets s2
P3 gets s'2
Can anyone think of any reason as to why this scheme is not theoretically secure, it is very inefficient but as far as i know it is secure, i just don't know how to prove or disprove it.
many thanks