Constructing perfect secret sharing schemes for general and uniform access structures

被引:0
|
作者
Sun, HM [1 ]
Shieh, SP
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
[2] Natl Chiao Tung Univ, Dept Comp Sci & Informat Engn, Hsinchu 300, Taiwan
关键词
cryptography; information security; secret sharing schemes; threshold schemes; information theory; access structures;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A perfect secret sharing scheme allows a secret K to be shared among a set of participants in such a way that only qualified subsets of participants can recover the secret, and unqualified subsets of participants obtain no information regarding the secret. In this paper, we propose a construction of perfect secret sharing schemes with uniform, generalized access structures of rank 3. Compared with other constructions, our construction has some improved lower bounds on the information rate. In addition, we also generalize the construction to perfect secret sharing schemes with uniform, generalized access structures of constant rank.
引用
收藏
页码:679 / 689
页数:11
相关论文
共 50 条
  • [1] Secret-Sharing Schemes for General and Uniform Access Structures
    Applebaum, Benny
    Beimel, Amos
    Farras, Oriol
    Nir, Oded
    Peter, Naty
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT III, 2019, 11478 : 441 - 471
  • [2] Secret Sharing Schemes with General Access Structures
    Liu, Jian
    Mesnager, Sihem
    Chen, Lusheng
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 341 - 360
  • [3] A perfect secret sharing scheme for general access structures
    Jia, Xingxing
    Guo, Yusheng
    Luo, Xiangyang
    Wang, Daoshun
    Zhang, Chaoyang
    [J]. INFORMATION SCIENCES, 2022, 595 : 54 - 69
  • [4] On general perfect secret sharing schemes
    Blakley, GR
    Kabatianski, GA
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 367 - 371
  • [5] Ideal and Computationally Perfect Secret Sharing Schemes for Generalized Access Structures
    Pattipati, Dileep Kumar
    Tentu, Appala Naidu
    Venkaiah, V. Ch.
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 149 - 161
  • [6] Perfect secret sharing schemes for graph access structures on six participants
    Gharahi, Motahhareh
    Dehkordi, Massoud Hadian
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2013, 7 (02) : 143 - 146
  • [7] Efficient secret sharing schemes realizing general access structures
    Tochikubo, K
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (07) : 1788 - 1797
  • [8] Non-perfect secret sharing over general access structures
    Srinathan, K
    Rajan, NT
    Rangan, CP
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 409 - 421
  • [9] Strongly secure ramp secret sharing schemes for general access structures
    Iwamoto, M
    Yamamoto, H
    [J]. INFORMATION PROCESSING LETTERS, 2006, 97 (02) : 52 - 57
  • [10] Optimal Non-perfect Uniform Secret Sharing Schemes
    Farras, Oriol
    Hansen, Torben
    Kaced, Tarik
    Padro, Carles
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 217 - 234