General results on secret sharing based on general access structure

被引:0
|
作者
Zhang, Haibo [1 ]
Wang, Xiaofei [1 ]
Huang, Youpeng [1 ]
机构
[1] Wuhan Digital Engineering Institute, Wuhan 430074, China
关键词
Information theory - Set theory;
D O I
暂无
中图分类号
学科分类号
摘要
For secret sharing, current researches mainly focus on perfect access structures with a very limited number of access subsets, where each subset is either a qualified set or a forbidden set and no semi-access subset exists, as well as on the share's bounds under a uniform distribution, where the number of the bits required by a share is used as the measurement of the bounds. Therefore, the research results are inevitably limited to some extent. Based on general access structures, some generalized information-theoretic results that are suitable for both perfect and non-perfect access structures with an unlimited number of access subsets identified by qualified, forbidden or semi-access are presented in this paper. These results are the general conclusions of many current related works and can be used as the basis for further researches. Meantime, using the information entropy of a share as the measurement of the bounds, some generalized bounds that are suitable for all shares and bounds that are suitable only for particular shares are given too. The bounds are also the generalization of many current related results under arbitrary probability distributions. Some of the bounds are tighter than those well-known ones. Additionally, with the help of the above new generalized results, some potential results can be easily deduced and the proof for many well-known results can be easier and more concise.
引用
收藏
页码:207 / 215
相关论文
共 50 条
  • [1] Realizing secret sharing with general access structure
    Harn, Lein
    Hsu, Chingfang
    Zhang, Mingwu
    He, Tingting
    Zhang, Maoyuan
    INFORMATION SCIENCES, 2016, 367 : 209 - 220
  • [2] A Universal Secret Sharing Scheme with General Access Structure Based on CRT
    Meng, Keju
    Miao, Fuyou
    Yu, Yue
    Lu, Changbin
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 142 - 148
  • [3] Fourier-Based Function Secret Sharing with General Access Structure
    Koshiba, Takeshi
    MATHEMATICS AND COMPUTING (ICMC 2018), 2018, 253 : 417 - 428
  • [4] Multi-secret sharing scheme based on the general access structure
    Pang, Liaojun
    Jiang, Zhengtao
    Wang, Yumin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2006, 43 (01): : 33 - 38
  • [5] A construction for secret sharing scheme with general access structure
    Guo, C. (guo8016@gmail.com), 1600, Ubiquitous International (04):
  • [6] Quantum secret sharing for a general quantum access structure
    Chen-Ming Bai
    Zhi-Hui Li
    Meng-Meng Si
    Yong-Ming Li
    The European Physical Journal D, 2017, 71
  • [7] Quantum secret sharing for a general quantum access structure
    Bai, Chen-Ming
    Li, Zhi-Hui
    Si, Meng-Meng
    Li, Yong-Ming
    EUROPEAN PHYSICAL JOURNAL D, 2017, 71 (10):
  • [8] Generalized general access structure in secret image sharing
    Yan, Xuehu
    Lu, Yuliang
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2019, 58 : 89 - 101
  • [9] Multiple secret image sharing with general access structure
    Chen, Tzung-Her
    Wu, Xi-Wen
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (19-20) : 13247 - 13265
  • [10] Multiple secret image sharing with general access structure
    Tzung-Her Chen
    Xi-Wen Wu
    Multimedia Tools and Applications, 2020, 79 : 13247 - 13265