Access structures of hyperelliptic secret sharing schemes

被引:0
|
作者
Yang, Siman [1 ]
Wu, Hongfeng [2 ]
Lie, Jiyou [3 ]
机构
[1] E China Normal Univ, Dept Math, Shanghai 200241, Peoples R China
[2] North China Univ Technol, Coll Sci, Beijing 100144, Peoples R China
[3] Shanghai Jiao Tong Univ, Dept Math, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Secret sharing schemes; Hyperelliptic curves; Algebraic-geometric codes;
D O I
10.1016/j.ffa.2015.09.002
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In CRYPTO 2006 Chen and Cramer proposed secret sharing schemes (SSS) from algebraic-geometric (AG) codes. The schemes are ramp schemes with gap bounded by 2g, where g is the genus of the underlying curve. Subsequently, Chen, Ling and Xing explicitly gave a complete characterization of the access structures for one special and important instance-elliptic secret sharing schemes (the ones from algebraic-geometric codes associated with elliptic curves), and additionally constructed weighted threshold secret sharing schemes from algebraic curves. In elliptic SSS case, one single point on an elliptic curve was computed to determine whether a set, with size in the gap mentioned above, is qualified. In this paper, we generalize Chen, Ling and Xing's idea and method to the case where the underlying curve is a hyperelliptic curve of arbitrary genus. By the means of Cantor's algorithm, we compute a reduced divisor to determine whether a set is qualified. Moreover, we construct a weighted hyperelliptic secret sharing schemes. Thus we reduce the gap size from 2g to g - 1 in both ideal and weighted hyperelliptic SSS cases. One explicit example is provided. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:46 / 53
页数:8
相关论文
共 50 条
  • [1] Access structures of elliptic secret sharing schemes
    Chen, Hao
    Ling, San
    Xing, Chaoping
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (02) : 850 - 852
  • [2] Secret Sharing Schemes with General Access Structures
    Liu, Jian
    Mesnager, Sihem
    Chen, Lusheng
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 341 - 360
  • [3] Secret sharing schemes for compartmented access structures
    Wang, Xianfang
    Xiang, Can
    Fu, Fang-Wei
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2017, 9 (05): : 625 - 635
  • [4] Secret sharing schemes for compartmented access structures
    Xianfang Wang
    Can Xiang
    Fang-Wei Fu
    [J]. Cryptography and Communications, 2017, 9 : 625 - 635
  • [5] Secret sharing schemes with nice access structures
    Ding, Cunsheng
    Salomaa, Arto
    [J]. FUNDAMENTA INFORMATICAE, 2006, 73 (1-2) : 51 - 62
  • [6] Linear secret sharing schemes and rearrangements of access structures
    Xiao L.-L.
    Liu M.-L.
    [J]. Acta Mathematicae Applicatae Sinica, 2004, 20 (4) : 685 - 694
  • [7] Rearrangements of access structures and their realizations in secret sharing schemes
    Zhang, Zhifang
    Liu, Mulan
    Xiao, Liangliang
    [J]. DISCRETE MATHEMATICS, 2008, 308 (21) : 4882 - 4891
  • [8] Ideal secret sharing schemes with multipartite access structures
    Ng, SL
    [J]. IEE PROCEEDINGS-COMMUNICATIONS, 2006, 153 (02): : 165 - 168
  • [9] Probabilistic Secret Sharing Schemes for Multipartite Access Structures
    Wang, Xianfang
    Fu, Fang-Wei
    Guang, Xuan
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (04) : 856 - 862
  • [10] Secret Sharing Schemes for (k, n)-Consecutive Access Structures
    Herranz, Javier
    Saez, German
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2018, 2018, 11124 : 463 - 480