Three-level secret sharing schemes from the twisted cubic

被引:20
|
作者
Giulietti, Massimo [1 ]
Vincenti, Rita [1 ]
机构
[1] Univ Perugia, Dipartimento Matemat & Informat, I-06123 Perugia, Italy
关键词
Secret sharing schemes; Baer subgeometries; Arc; Twisted cubic;
D O I
10.1016/j.disc.2009.11.040
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Three-level secret sharing schemes arising from the vector space construction over a finite field F are presented. Compared to the previously known schemes, they allow a larger number of participants with respect to the size of F. The key tool is the twisted cubic of PG(3, F). (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:3236 / 3240
页数:5
相关论文
共 50 条
  • [1] Secret sharing schemes from three classes of linear codes
    Yuan, J
    Ding, CS
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (01) : 206 - 212
  • [2] Three-Level Schemes for the Advection Equation
    P. N. Vabishchevich
    [J]. Differential Equations, 2019, 55 : 905 - 914
  • [3] Three-Level Schemes for the Advection Equation
    Vabishchevich, P. N.
    [J]. DIFFERENTIAL EQUATIONS, 2019, 55 (07) : 905 - 914
  • [4] Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes
    Eriguchi, Reo
    Kunihiro, Noboru
    [J]. 2019 IEEE INFORMATION THEORY WORKSHOP (ITW), 2019, : 264 - 268
  • [5] Quantitative security analysis of three-level unitary operations in quantum secret sharing without entanglement
    Xu, Juan
    Li, Xi
    Han, Yunguang
    Zhou, Yuqian
    Liu, Zhihao
    Zhang, Zhengye
    Song, Yinxiu
    [J]. FRONTIERS IN PHYSICS, 2023, 11
  • [6] On secret sharing schemes
    Blundo, C
    De Santis, A
    Vaccaro, U
    [J]. INFORMATION PROCESSING LETTERS, 1998, 65 (01) : 25 - 32
  • [7] Three-level schemes of the alternating triangular method
    P. N. Vabishchevich
    [J]. Computational Mathematics and Mathematical Physics, 2014, 54 : 953 - 962
  • [8] Three-level schemes of the alternating triangular method
    Vabishchevich, P. N.
    [J]. COMPUTATIONAL MATHEMATICS AND MATHEMATICAL PHYSICS, 2014, 54 (06) : 953 - 962
  • [9] On secret reconstruction in secret sharing schemes
    Wang, Huaxiong
    Wong, Duncan S.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (01) : 473 - 480
  • [10] Ideal secret sharing schemes from permutations
    Pieprzyk, Josef
    Zhang, Xian-Mo
    [J]. International Journal of Network Security, 2006, 2 (03) : 238 - 244