Secret Sharing Schemes with General Access Structures

被引:0
|
作者
Liu, Jian [1 ,2 ]
Mesnager, Sihem [3 ,4 ]
Chen, Lusheng [5 ]
机构
[1] Tianjin Univ, Sch Comp Software, Tianjin 300072, Peoples R China
[2] CNRS, UMR LAGA 7539, Paris, France
[3] Univ Paris 13, Univ Paris 08, Dept Math, CNRS,UMR LAGA 7539, Paris, France
[4] Telecom ParisTech, Paris, France
[5] Nankai Univ, Sch Math Sci, Tianjin 300071, Peoples R China
关键词
Secret sharing schemes; General access structures; Information rate; Orthogonal arrays; Resilient functions; CODES;
D O I
10.1007/978-3-319-38898-4_20
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Secret sharing schemes with general monotone access structures have been widely discussed in the literature. But in some scenarios, non-monotone access structures may have more practical significance. In this paper, we shed a new light on secret sharing schemes realizing general (not necessarily monotone) access structures. Based on an attack model for secret sharing schemes with general access structures, we redefine perfect secret sharing schemes, which is a generalization of the known concept of perfect secret sharing schemes with monotone access structures. Then, we provide for the first time two constructions of perfect secret sharing schemes with general access structures. The first construction can be seen as a democratic scheme in the sense that the shares are generated by the players themselves. Our second construction significantly enhances the efficiency of the system, where the shares are distributed by the trusted center (TC).
引用
收藏
页码:341 / 360
页数:20
相关论文
共 50 条
  • [1] Secret-Sharing Schemes for General and Uniform Access Structures
    Applebaum, Benny
    Beimel, Amos
    Farras, Oriol
    Nir, Oded
    Peter, Naty
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT III, 2019, 11478 : 441 - 471
  • [2] Efficient secret sharing schemes realizing general access structures
    Tochikubo, K
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (07) : 1788 - 1797
  • [3] Strongly secure ramp secret sharing schemes for general access structures
    Iwamoto, M
    Yamamoto, H
    [J]. INFORMATION PROCESSING LETTERS, 2006, 97 (02) : 52 - 57
  • [4] Constructing perfect secret sharing schemes for general and uniform access structures
    Sun, HM
    Shieh, SP
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 1999, 15 (05) : 679 - 689
  • [5] Access structures of elliptic secret sharing schemes
    Chen, Hao
    Ling, San
    Xing, Chaoping
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (02) : 850 - 852
  • [6] Secret sharing schemes with nice access structures
    Ding, Cunsheng
    Salomaa, Arto
    [J]. FUNDAMENTA INFORMATICAE, 2006, 73 (1-2) : 51 - 62
  • [7] Secret sharing schemes for compartmented access structures
    Wang, Xianfang
    Xiang, Can
    Fu, Fang-Wei
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2017, 9 (05): : 625 - 635
  • [8] Secret sharing schemes for compartmented access structures
    Xianfang Wang
    Can Xiang
    Fang-Wei Fu
    [J]. Cryptography and Communications, 2017, 9 : 625 - 635
  • [9] Access structures of hyperelliptic secret sharing schemes
    Yang, Siman
    Wu, Hongfeng
    Lie, Jiyou
    [J]. FINITE FIELDS AND THEIR APPLICATIONS, 2016, 37 : 46 - 53
  • [10] Strong security of linear ramp secret sharing schemes with general access structures
    Eriguchi, Reo
    Kunihiro, Noboru
    [J]. INFORMATION PROCESSING LETTERS, 2020, 164