Efficient secret sharing schemes based on authorized subsets

被引:21
|
作者
Tochikubo, K [1 ]
Uyematsu, T
Matsumoto, R
机构
[1] Tokyo Inst Technol, Dept Commun & Integrated Syst, Tokyo 1528550, Japan
[2] Toshiba Solut Corp, Syst Integrat Technol Ctr, Tokyo 1838512, Japan
[3] Tokyo Inst Technol, Dept Commun & Integrated Syst, Tokyo 1528550, Japan
关键词
(k; n)-threshold scheme; general access structure; verifiable secret sharing scheme;
D O I
10.1093/ietfec/E88-A.1.322
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose efficient secret sharing schemes realizing general access structures. Our proposed, schemes are perfect secret sharing schemes and include Shamir's (k,n)-threshold schemes as a special case. Furthermore, we show that a verifiable secret sharing scheme for general access structures is realized by one of the proposed schemes.
引用
收藏
页码:322 / 326
页数:5
相关论文
共 50 条
  • [31] New approaches for efficient information hiding-based secret image sharing schemes
    Yan, Xuehu
    Wang, Shen
    Abd El-Latif, Ahmed A.
    Niu, Xiamu
    [J]. SIGNAL IMAGE AND VIDEO PROCESSING, 2015, 9 (03) : 499 - 510
  • [32] Communication Efficient and Strongly Secure Secret Sharing Schemes Based on Algebraic Geometry Codes
    Martinez-Penas, Umberto
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (06) : 4191 - 4206
  • [33] Secret sharing schemes based on the dual of Golay codes
    Ding, Jian
    Lin, Changlu
    Mesnager, Sihem
    [J]. Cryptography and Communications, 2021, 13 (06) : 1025 - 1041
  • [34] Secret sharing schemes based on the dual of Golay codes
    Ding, Jian
    Lin, Changlu
    Mesnager, Sihem
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2021, 13 (06): : 1025 - 1041
  • [35] On identification secret sharing schemes
    Cai, N
    Lam, KY
    [J]. INFORMATION AND COMPUTATION, 2003, 184 (02) : 298 - 310
  • [36] Analysis of secret sharing schemes based on Nielsen transformations
    Kotov, Matvei
    Panteleev, Dmitry
    Ushakov, Alexander
    [J]. GROUPS COMPLEXITY CRYPTOLOGY, 2018, 10 (01) : 1 - 8
  • [37] Two secret sharing schemes based on Boolean operations
    Wang, Daoshun
    Zhang, Lei
    Ma, Ning
    Li, Xiaobo
    [J]. PATTERN RECOGNITION, 2007, 40 (10) : 2776 - 2785
  • [38] On Proactive Secret Sharing Schemes
    Nikov, V
    Nikova, S
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 308 - 325
  • [39] A Survey of Secret Sharing Schemes Based on Latin Squares
    Tso, Raylin
    Miao, Ying
    [J]. ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT II, 2018, 82 : 267 - 272
  • [40] Secret Sharing Schemes Based on Min-Entropies
    Iwamoto, Mitsugu
    Shikata, Junji
    [J]. 2014 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2014, : 401 - 405