Constructions of some secret sharing schemes based on linear codes

被引:0
|
作者
Ratseev, S. M. [1 ]
机构
[1] Ulyanovsk State Univ, 42 Leo Tolstoy St, Ulyanovsk 432017, Russia
关键词
cryptography; linear code; secret sharing scheme; access structure;
D O I
10.18500/1816-9791-2024-24-3-330-341
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
There are perfect and ideal threshold secret sharing schemes, for example, Shamir's secret sharing scheme. For the case of general secret sharing schemes with an arbitrary access structure, it is possible to construct a perfect scheme for any access structure (for example, the Ito - Saito - Nishizeki scheme, the Benaloh - Leichter scheme), but in general, such a scheme will not be an ideal secret sharing scheme. In the paper, for some classes of access structures, the construction of perfect and ideal secret sharing schemes based on linear codes is given. We also give a construction of perfect verifiable secret sharing schemes for any access structure for which there is a line code that implements this structure.
引用
收藏
页码:330 / 341
页数:12
相关论文
共 50 条
  • [1] Secret sharing schemes from binary linear codes
    Li, Zhihui
    Xue, Ting
    Lai, Hong
    [J]. INFORMATION SCIENCES, 2010, 180 (22) : 4412 - 4419
  • [2] Secret sharing schemes based on graphical codes
    Gao, Ying
    dela Cruz, Romar
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2014, 6 (02): : 137 - 155
  • [3] Secret sharing schemes based on graphical codes
    Ying Gao
    Romar dela Cruz
    [J]. Cryptography and Communications, 2014, 6 : 137 - 155
  • [4] Secret sharing schemes based on Nonlinear codes
    Agrawal, Deepak
    Das, Smarajit
    Krishanaswamy, Srinivasan
    [J]. 2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2020, : 864 - 867
  • [5] Secret sharing schemes from three classes of linear codes
    Yuan, J
    Ding, CS
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (01) : 206 - 212
  • [6] Secret sharing schemes based on the dual of Golay codes
    Ding, Jian
    Lin, Changlu
    Mesnager, Sihem
    [J]. Cryptography and Communications, 2021, 13 (06) : 1025 - 1041
  • [7] Secret sharing schemes based on the dual of Golay codes
    Ding, Jian
    Lin, Changlu
    Mesnager, Sihem
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2021, 13 (06): : 1025 - 1041
  • [8] Secret sharing schemes based on the dual of Golay codes
    Jian Ding
    Changlu Lin
    Sihem Mesnager
    [J]. Cryptography and Communications, 2021, 13 : 1025 - 1041
  • [9] Linear codes from perfect nonlinear mappings and their secret sharing schemes
    Carlet, C
    Ding, CS
    Yuan, J
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (06) : 2089 - 2102
  • [10] Secret Sharing Schemes from Linear Codes over Finite Rings
    Qian, Jianfa
    Ma, Wenping
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (07) : 1193 - 1196