Constructing perfect secret sharing schemes for general and uniform access structures

被引:0
|
作者
Sun, HM [1 ]
Shieh, SP
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
[2] Natl Chiao Tung Univ, Dept Comp Sci & Informat Engn, Hsinchu 300, Taiwan
关键词
cryptography; information security; secret sharing schemes; threshold schemes; information theory; access structures;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A perfect secret sharing scheme allows a secret K to be shared among a set of participants in such a way that only qualified subsets of participants can recover the secret, and unqualified subsets of participants obtain no information regarding the secret. In this paper, we propose a construction of perfect secret sharing schemes with uniform, generalized access structures of rank 3. Compared with other constructions, our construction has some improved lower bounds on the information rate. In addition, we also generalize the construction to perfect secret sharing schemes with uniform, generalized access structures of constant rank.
引用
收藏
页码:679 / 689
页数:11
相关论文
共 50 条
  • [11] Access structures of elliptic secret sharing schemes
    Chen, Hao
    Ling, San
    Xing, Chaoping
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (02) : 850 - 852
  • [12] Access structures of hyperelliptic secret sharing schemes
    Yang, Siman
    Wu, Hongfeng
    Lie, Jiyou
    [J]. FINITE FIELDS AND THEIR APPLICATIONS, 2016, 37 : 46 - 53
  • [13] Secret sharing schemes for compartmented access structures
    Wang, Xianfang
    Xiang, Can
    Fu, Fang-Wei
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2017, 9 (05): : 625 - 635
  • [14] Secret sharing schemes for compartmented access structures
    Xianfang Wang
    Can Xiang
    Fang-Wei Fu
    [J]. Cryptography and Communications, 2017, 9 : 625 - 635
  • [15] Secret sharing schemes with nice access structures
    Ding, Cunsheng
    Salomaa, Arto
    [J]. FUNDAMENTA INFORMATICAE, 2006, 73 (1-2) : 51 - 62
  • [16] Strong security of linear ramp secret sharing schemes with general access structures
    Eriguchi, Reo
    Kunihiro, Noboru
    [J]. INFORMATION PROCESSING LETTERS, 2020, 164
  • [17] PERFECT SECRET SHARING SCHEMES
    Parvatov, K. G.
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2008, 2 (02): : 50 - 57
  • [18] Linear secret sharing schemes and rearrangements of access structures
    Xiao L.-L.
    Liu M.-L.
    [J]. Acta Mathematicae Applicatae Sinica, 2004, 20 (4) : 685 - 694
  • [19] Rearrangements of access structures and their realizations in secret sharing schemes
    Zhang, Zhifang
    Liu, Mulan
    Xiao, Liangliang
    [J]. DISCRETE MATHEMATICS, 2008, 308 (21) : 4882 - 4891
  • [20] Ideal secret sharing schemes with multipartite access structures
    Ng, SL
    [J]. IEE PROCEEDINGS-COMMUNICATIONS, 2006, 153 (02): : 165 - 168