Secret sharing schemes with nice access structures

被引:0
|
作者
Ding, Cunsheng [1 ]
Salomaa, Arto
机构
[1] Hong Kong Univ Sci & Technol, Dept Comp Sci, Kowloon, Hong Kong, Peoples R China
[2] Turku Ctr Comp Sci, FIN-20520 Turku, Finland
关键词
secret sharing; linear codes; access structures;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Secret sharing schemes, introduced by Blakley and Shamir independently in 1979, have a number of applications in security systems. One approach to the construction of secret sharing schemes is based on coding theory. In principle, every linear code can be used to construct secret sharing schemes. But only well structured linear codes give secret sharing schemes with nice access structures in the sense that every pair of participants plays the same role in the secret sharing. In this paper, we construct a class of good linear codes, and use them to obtain a class of secret sharing schemes with nice access structures.
引用
收藏
页码:51 / 62
页数:12
相关论文
共 50 条
  • [1] Access structures of elliptic secret sharing schemes
    Chen, Hao
    Ling, San
    Xing, Chaoping
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (02) : 850 - 852
  • [2] Secret sharing schemes for compartmented access structures
    Wang, Xianfang
    Xiang, Can
    Fu, Fang-Wei
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2017, 9 (05): : 625 - 635
  • [3] Secret sharing schemes for compartmented access structures
    Xianfang Wang
    Can Xiang
    Fang-Wei Fu
    [J]. Cryptography and Communications, 2017, 9 : 625 - 635
  • [4] Secret Sharing Schemes with General Access Structures
    Liu, Jian
    Mesnager, Sihem
    Chen, Lusheng
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 341 - 360
  • [5] Access structures of hyperelliptic secret sharing schemes
    Yang, Siman
    Wu, Hongfeng
    Lie, Jiyou
    [J]. FINITE FIELDS AND THEIR APPLICATIONS, 2016, 37 : 46 - 53
  • [6] Linear secret sharing schemes and rearrangements of access structures
    Xiao L.-L.
    Liu M.-L.
    [J]. Acta Mathematicae Applicatae Sinica, 2004, 20 (4) : 685 - 694
  • [7] Probabilistic Secret Sharing Schemes for Multipartite Access Structures
    Wang, Xianfang
    Fu, Fang-Wei
    Guang, Xuan
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (04) : 856 - 862
  • [8] Rearrangements of access structures and their realizations in secret sharing schemes
    Zhang, Zhifang
    Liu, Mulan
    Xiao, Liangliang
    [J]. DISCRETE MATHEMATICS, 2008, 308 (21) : 4882 - 4891
  • [9] Ideal secret sharing schemes with multipartite access structures
    Ng, SL
    [J]. IEE PROCEEDINGS-COMMUNICATIONS, 2006, 153 (02): : 165 - 168
  • [10] Secret Sharing Schemes for (k, n)-Consecutive Access Structures
    Herranz, Javier
    Saez, German
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2018, 2018, 11124 : 463 - 480