Linear codes from perfect nonlinear mappings and their secret sharing schemes

被引:305
|
作者
Carlet, C
Ding, CS
Yuan, J
机构
[1] Inst Natl Rech Informat & Automat, Project Codes, F-78153 Le Chesnay, France
[2] Univ Paris 08, Paris, France
[3] Hong Kong Univ Sci & Technol, Dept Comp Sci, Kowloon, Hong Kong, Peoples R China
关键词
cryptography; linear codes; perfect nonlinear functions; planar functions; secret sharing schemes;
D O I
10.1109/TIT.2005.847722
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper,, error-correcting codes from perfect nonlinear mappings are constructed, and then employed to construct secret sharing schemes. The error-correcting codes obtained in this paper are very good in general, and many of them are optimal or almost optimal. The secret sharing schemes obtained in this paper have two types of access structures. The first type is democratic in the sense that every participant is involved in the same number of minimal-access sets. In the second type of access structures, there are a few dictators who are in every minimal access set, while each of the remaining participants is in the same number of minimal-access sets.
引用
收藏
页码:2089 / 2102
页数:14
相关论文
共 50 条
  • [1] Secret sharing schemes from binary linear codes
    Li, Zhihui
    Xue, Ting
    Lai, Hong
    [J]. INFORMATION SCIENCES, 2010, 180 (22) : 4412 - 4419
  • [2] Secret sharing schemes based on Nonlinear codes
    Agrawal, Deepak
    Das, Smarajit
    Krishanaswamy, Srinivasan
    [J]. 2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2020, : 864 - 867
  • [3] Secret sharing schemes from three classes of linear codes
    Yuan, J
    Ding, CS
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (01) : 206 - 212
  • [4] Secret Sharing Schemes from Linear Codes over Finite Rings
    Qian, Jianfa
    Ma, Wenping
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (07) : 1193 - 1196
  • [5] PERFECT SECRET SHARING SCHEMES
    Parvatov, K. G.
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2008, 2 (02): : 50 - 57
  • [6] Linear codes from weakly regular plateaued functions and their secret sharing schemes
    Mesnager, Sihem
    Ozbudak, Ferruh
    Sinak, Ahmet
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (2-3) : 463 - 480
  • [7] Linear codes from weakly regular plateaued functions and their secret sharing schemes
    Sihem Mesnager
    Ferruh Özbudak
    Ahmet Sınak
    [J]. Designs, Codes and Cryptography, 2019, 87 : 463 - 480
  • [8] Constructions of some secret sharing schemes based on linear codes
    Ratseev, S. M.
    [J]. IZVESTIYA OF SARATOV UNIVERSITY MATHEMATICS MECHANICS INFORMATICS, 2024, 24 (03): : 330 - 341
  • [9] Secret Sharing Schemes from from Linear Codes over Fp+ vFp
    Wang, Xianfang
    Gao, Jian
    Fu, Fang-Wei
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2016, 27 (05) : 595 - 605
  • [10] Perfect secret sharing schemes from combinatorial squares
    Saurabh, Shyam
    Sinha, Kishore
    [J]. SECURITY AND PRIVACY, 2022, 5 (06):