%0 Journal Article %T A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem %J The ISC International Journal of Information Security %I Iranian Society of Cryptology %Z 2008-2045 %A Ebrahimi Kiasari, Mohammad Ebrahim %A Pakniat, Nasrollah %A Mirghadri, Abdolrasoul %A Nazari, Mojtaba %D 2023 %\ 01/01/2023 %V 15 %N 1 %P 125-135 %! A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem %K Multi-Secret Sharing %K Multi-Stage Secret Sharing %K Social Secret Sharing %K Hierarchical Threshold Access Structure %R 10.22042/isecure.2022.293948.689 %X Secret sharing (SS) schemes allow the sharing of a secret among a set of trustees in such a way that only some qualified subsets of them can recover the secret. Ordinary SS schemes assume that the trust to each trustee is fixed over time. However, this is not the case in many real scenarios. Social secret sharing (SSS) is a recently introduced type of SS that addresses this issue. It allows the sharing of a secret among a set of trustees such that the amount of trust to each participant could be changed over time. There exist only a few SSS schemes in the literature; most of them can share only one secret during each execution. Hence, these schemes lack the required efficiency in situations where multiple secrets need to be shared. According to the literature, there exists only one social multi-secret sharing (SMSS) scheme in which, all the secrets are reconstructed at one stage. However, in many applications, the secrets should be recovered in multiple stages and even according to some specified order. To address these problems, this paper employs Birkhoff interpolation method and Chinese remainder theorem and proposes a new SMSS scheme. In the proposed scheme, the shareholders can recover the secrets in different stages and according to the specified order by the dealer. The security analysis of the proposed scheme shows that it provides all the needed security requirements. In addition, the performance analysis of the proposed scheme indicates its overall superiority over the related schemes. %U https://www.isecure-journal.com/article_155294_fe05d0849f828ad7229cedf3265d85bc.pdf