Ideal and Computationally Perfect Secret Sharing Schemes for Generalized Access Structures

被引:0
|
作者
Pattipati, Dileep Kumar [1 ]
Tentu, Appala Naidu [2 ]
Venkaiah, V. Ch. [1 ]
机构
[1] Univ Hyderabad, Sch Comp & Informat Sci, Hyderabad 500046, Andhra Pradesh, India
[2] CR Rao Adv Inst Math Stat & Comp Sci, Hyderabad 500046, Andhra Pradesh, India
来源
关键词
Computationally perfect; Ideal scheme; One-way function; Secret sharing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A secret sharing scheme is proposed in this paper. The scheme is ideal and uses computationally perfect concept. It uses a one way function and realizes generalized access structure. The scheme is useful for non-ideal access structures. For example, Stinson[14] has identified eighteen possible non-isomorphic monotone access structures with four participants. Fourteen of them admit ideal and perfect secret sharing schemes. The remaining four cannot be made both perfect and ideal. By making use of the computationally perfect concept, we propose ideal scheme for those four access structures. Novelty of the scheme is that it is applicable for any number of participants and generates the least amount of public information. In fact, we show results that establish that the proposed scheme is optimal for access structures consisting of four or less number of participants. Our scheme can be extended to multiple secrets. Since some applications require that a secret sharing scheme designed for it be extended to the case of multiple secrets, our approach finds it useful in such scenarios.
引用
收藏
页码:149 / 161
页数:13
相关论文
共 50 条
  • [1] Ideal secret sharing schemes with multipartite access structures
    Ng, SL
    [J]. IEE PROCEEDINGS-COMMUNICATIONS, 2006, 153 (02): : 165 - 168
  • [2] Constructing perfect secret sharing schemes for general and uniform access structures
    Sun, HM
    Shieh, SP
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 1999, 15 (05) : 679 - 689
  • [3] Perfect secret sharing schemes for graph access structures on six participants
    Gharahi, Motahhareh
    Dehkordi, Massoud Hadian
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2013, 7 (02) : 143 - 146
  • [4] Access structures of elliptic secret sharing schemes
    Chen, Hao
    Ling, San
    Xing, Chaoping
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (02) : 850 - 852
  • [5] Access structures of hyperelliptic secret sharing schemes
    Yang, Siman
    Wu, Hongfeng
    Lie, Jiyou
    [J]. FINITE FIELDS AND THEIR APPLICATIONS, 2016, 37 : 46 - 53
  • [6] Secret Sharing Schemes with General Access Structures
    Liu, Jian
    Mesnager, Sihem
    Chen, Lusheng
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 341 - 360
  • [7] Secret sharing schemes for compartmented access structures
    Wang, Xianfang
    Xiang, Can
    Fu, Fang-Wei
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2017, 9 (05): : 625 - 635
  • [8] Secret sharing schemes for compartmented access structures
    Xianfang Wang
    Can Xiang
    Fang-Wei Fu
    [J]. Cryptography and Communications, 2017, 9 : 625 - 635
  • [9] Secret sharing schemes with nice access structures
    Ding, Cunsheng
    Salomaa, Arto
    [J]. FUNDAMENTA INFORMATICAE, 2006, 73 (1-2) : 51 - 62
  • [10] Ideal and perfect multi-secret sharing schemes whose access structure are Q3
    Lv Yingli
    Xu Xiaojun
    Zhang Xiaofeng
    Zhang Lianlian
    [J]. 2012 8TH INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORKING TECHNOLOGY (ICCNT, INC, ICCIS AND ICMIC), 2012, : 21 - 25