Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 5437403, 6 pages
Research Article

How to Share Secret Efficiently over Networks

1Department of Computer Science Electrical Engineering, University of Missouri-Kansas City, Kansas City, MO 64110, USA
2Computer School, Central China Normal University, Wuhan 430079, China
3Department of Computer Science, Wuhan University of Technology, Wuhan 430071, China
4Hubei Key Laboratory of Transportation Internet of Things, Wuhan University of Technology, Wuhan, China

Correspondence should be addressed to Ching-Fang Hsu; moc.liamg@gnafgnijyrrehc

Received 22 January 2017; Revised 22 July 2017; Accepted 9 August 2017; Published 27 September 2017

Academic Editor: Pedro Peris-Lopez

Copyright © 2017 Lein Harn et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


In a secret-sharing scheme, the secret is shared among a set of shareholders, and it can be reconstructed if a quorum of these shareholders work together by releasing their secret shares. However, in many applications, it is undesirable for nonshareholders to learn the secret. In these cases, pairwise secure channels are needed among shareholders to exchange the shares. In other words, a shared key needs to be established between every pair of shareholders. But employing an additional key establishment protocol may make the secret-sharing schemes significantly more complicated. To solve this problem, we introduce a new type of secret-sharing, called protected secret-sharing (PSS), in which the shares possessed by shareholders not only can be used to reconstruct the original secret but also can be used to establish the shared keys between every pair of shareholders. Therefore, in the secret reconstruction phase, the recovered secret is only available to shareholders but not to nonshareholders. In this paper, an information theoretically secure PSS scheme is proposed, its security properties are analyzed, and its computational complexity is evaluated. Moreover, our proposed PSS scheme also can be applied to threshold cryptosystems to prevent nonshareholders from learning the output of the protocols.