Efficient secret sharing schemes based on authorized subsets

被引:21
|
作者
Tochikubo, K [1 ]
Uyematsu, T
Matsumoto, R
机构
[1] Tokyo Inst Technol, Dept Commun & Integrated Syst, Tokyo 1528550, Japan
[2] Toshiba Solut Corp, Syst Integrat Technol Ctr, Tokyo 1838512, Japan
[3] Tokyo Inst Technol, Dept Commun & Integrated Syst, Tokyo 1528550, Japan
关键词
(k; n)-threshold scheme; general access structure; verifiable secret sharing scheme;
D O I
10.1093/ietfec/E88-A.1.322
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose efficient secret sharing schemes realizing general access structures. Our proposed, schemes are perfect secret sharing schemes and include Shamir's (k,n)-threshold schemes as a special case. Furthermore, we show that a verifiable secret sharing scheme for general access structures is realized by one of the proposed schemes.
引用
收藏
页码:322 / 326
页数:5
相关论文
共 50 条
  • [11] Efficient multiparty quantum-secret-sharing schemes
    Xiao, L
    Long, GL
    Deng, FG
    Pan, JW
    PHYSICAL REVIEW A, 2004, 69 (05): : 052307 - 1
  • [12] Efficient Explicit Constructions of Multipartite Secret Sharing Schemes
    Chen, Qi
    Tang, Chunming
    Lin, Zhiqiang
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (01) : 601 - 631
  • [13] Efficient explicit constructions of compartmented secret sharing schemes
    Qi Chen
    Chunming Tang
    Zhiqiang Lin
    Designs, Codes and Cryptography, 2019, 87 : 2913 - 2940
  • [14] Efficient explicit constructions of compartmented secret sharing schemes
    Chen, Qi
    Tang, Chunming
    Lin, Zhiqiang
    DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (12) : 2913 - 2940
  • [15] Efficient (n, t, n) secret sharing schemes
    Liu, Yan-Xiao
    Harn, Lein
    Yang, Ching-Nung
    Zhang, Yu-Qing
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (06) : 1325 - 1332
  • [16] Efficient secret sharing schemes from room square
    Juan, JST
    Huang, CL
    Third International Conference on Information Technology and Applications, Vol 2, Proceedings, 2005, : 477 - 481
  • [17] An efficient construction of perfect secret sharing schemes for graph-based structures
    Sun, HM
    Shieh, SP
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1996, 31 (07) : 129 - 135
  • [18] On secret sharing schemes
    Blundo, C
    De Santis, A
    Vaccaro, U
    INFORMATION PROCESSING LETTERS, 1998, 65 (01) : 25 - 32
  • [19] Secret sharing schemes based on graphical codes
    Gao, Ying
    dela Cruz, Romar
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2014, 6 (02): : 137 - 155
  • [20] Secret sharing schemes based on graphical codes
    Ying Gao
    Romar dela Cruz
    Cryptography and Communications, 2014, 6 : 137 - 155