Probability of shares in secret sharing schemes

被引:3
|
作者
Blundo, C [1 ]
De Santis, A [1 ]
Gaggia, AG [1 ]
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, Italy
关键词
safety/security in digital systems; cryptography; probability;
D O I
10.1016/S0020-0190(99)00153-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A secret sharing scheme is a protocol to share a secret s among a set P of participants in such a way that only qualified subsets, pooling together their information, can reconstruct the secret s, but subsets of participants that are not enabled to recover the secret have no information on it. In this paper we analyze the sample space of shares for any set of participants. In particular, we prove tight bounds on the probability of shares and on the size of the space of shares in terms of the size of the secret set. (C) 1999 Published by Elsevier Science B.V. All rights reserved.
引用
收藏
页码:169 / 175
页数:7
相关论文
共 50 条
  • [1] Probability of shares in secret sharing schemes
    Dipto. di Info. Ed Applicazioni, Univ. di Salerno, 84081 , Baronissi, Italy
    Inf Process Lett, 5-6 (169-175):
  • [2] Reusing shares in secret sharing schemes
    Zheng, Yuliang, 1600, (37):
  • [3] REUSING SHARES IN SECRET SHARING SCHEMES
    ZHENG, YL
    HARDJONO, T
    SEBERRY, J
    COMPUTER JOURNAL, 1994, 37 (03): : 199 - 205
  • [4] ON THE SIZE OF SHARES FOR SECRET SHARING SCHEMES
    CAPOCELLI, RM
    DESANTIS, A
    GARGANO, L
    VACCARO, U
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 576 : 101 - 113
  • [5] Visual secret sharing schemes for multiple secret images allowing the rotation of shares
    Iwamoto, Mitsugu
    Wang, Lei
    Yoneyama, Kazuki
    Kunihiro, Noboru
    Ohta, Kazuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (05) : 1382 - 1395
  • [6] Lower bound on the sire of shares of nonperfect secret sharing schemes
    Okada, K
    Kurosawa, K
    ADVANCES IN CRYPTOLOGY - ASIACRYPT '94, 1995, 917 : 33 - 41
  • [7] Improvement of the Quality of Visual Secret Sharing Schemes with Constraints on the Usage of Shares
    Fujii, Mariko
    Shibuya, Tomoharu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (01): : 11 - 24
  • [8] Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes
    Sirhindi, Rabia
    Murtaza, Saeed
    Afzal, Mehreen
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2008, 5308 : 376 - 386
  • [9] On secret sharing schemes
    Blundo, C
    De Santis, A
    Vaccaro, U
    INFORMATION PROCESSING LETTERS, 1998, 65 (01) : 25 - 32
  • [10] Visual Secret Sharing with Meaningful Shares
    Shyu, Shyong Jian
    2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 576 - 580