Partial Secret Sharing Schemes

被引:2
|
作者
Jafari, Amir [1 ]
Khazaei, Shahram [1 ]
机构
[1] Sharif Univ Technol, Dept Math Sci, Tehran 113658639, Iran
基金
美国国家科学基金会;
关键词
~Information theoretic cryptography; secret sharing; perfect and non-perfect security; wiretap channel; decomposition methods; INFORMATION INEQUALITIES; COMMON RANDOMNESS; KEY AGREEMENT; CONSTRUCTIONS; MATROIDS; ENTROPY;
D O I
10.1109/TIT.2023.3265093
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The following standard relaxations of perfect security for secret sharing schemes (SSSs) exist in the literature: quasi-perfect, almost-perfect, and statistical. Understanding the power of these relaxations on the efficiency of SSSs, measured via a parameter called information ratio, is a long-standing open problem. In this article, we introduce and study an extremely relaxed security notion, called partial security, for which it is only required that any qualified set gains strictly more information about the secret than any unqualified one. To get a meaningful efficiency measure, we normalize the (standard) information ratio of such schemes by an appropriate parameter and refer to the new measure as partial information ratio. We present three main results in this paper. First, we prove that partial and perfect information ratios coincide for the class of linear SSSs. Second, we prove that for the general (i.e., non-linear) class of SSSs, partial and statistical information ratios are equal. Third, we show that partial and almost-perfect information ratios do not coincide for the class of mixed-linear schemes (i.e., schemes constructed by combining linear schemes with different underlying finite fields). We also use the notion of partial secret sharing to strengthen and unify the previous decomposition theorems for constructing SSSs.
引用
收藏
页码:5364 / 5385
页数:22
相关论文
共 50 条
  • [1] Secret sharing schemes with partial broadcast channels
    Rei Safavi-Naini
    Huaxiong Wang
    [J]. Designs, Codes and Cryptography, 2006, 41 : 5 - 22
  • [2] Secret sharing schemes with partial broadcast channels
    Safavi-Naini, Rei
    Wang, Huaxiong
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2006, 41 (01) : 5 - 22
  • [3] On secret sharing schemes
    Blundo, C
    De Santis, A
    Vaccaro, U
    [J]. INFORMATION PROCESSING LETTERS, 1998, 65 (01) : 25 - 32
  • [4] On secret reconstruction in secret sharing schemes
    Wang, Huaxiong
    Wong, Duncan S.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (01) : 473 - 480
  • [5] On identification secret sharing schemes
    Cai, N
    Lam, KY
    [J]. INFORMATION AND COMPUTATION, 2003, 184 (02) : 298 - 310
  • [6] On Proactive Secret Sharing Schemes
    Nikov, V
    Nikova, S
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 308 - 325
  • [7] PERFECT SECRET SHARING SCHEMES
    Parvatov, K. G.
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2008, 2 (02): : 50 - 57
  • [8] Secret sharing schemes on graphs
    Csirmaz, Laszlo
    [J]. STUDIA SCIENTIARUM MATHEMATICARUM HUNGARICA, 2007, 44 (03) : 297 - 306
  • [9] Anonymous secret sharing schemes
    Blundo, C
    Stinson, DR
    [J]. DISCRETE APPLIED MATHEMATICS, 1997, 77 (01) : 13 - 28
  • [10] Efficient Secret Sharing Schemes
    Lv, Chunli
    Jia, Xiaoqi
    Lin, Jingqiang
    Jing, Jiwu
    Tian, Lijun
    Sun, Mingli
    [J]. SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 114 - +