Efficient secret sharing schemes based on authorized subsets

被引:21
|
作者
Tochikubo, K [1 ]
Uyematsu, T
Matsumoto, R
机构
[1] Tokyo Inst Technol, Dept Commun & Integrated Syst, Tokyo 1528550, Japan
[2] Toshiba Solut Corp, Syst Integrat Technol Ctr, Tokyo 1838512, Japan
[3] Tokyo Inst Technol, Dept Commun & Integrated Syst, Tokyo 1528550, Japan
关键词
(k; n)-threshold scheme; general access structure; verifiable secret sharing scheme;
D O I
10.1093/ietfec/E88-A.1.322
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose efficient secret sharing schemes realizing general access structures. Our proposed, schemes are perfect secret sharing schemes and include Shamir's (k,n)-threshold schemes as a special case. Furthermore, we show that a verifiable secret sharing scheme for general access structures is realized by one of the proposed schemes.
引用
收藏
页码:322 / 326
页数:5
相关论文
共 50 条
  • [41] Partial Secret Sharing Schemes
    Jafari, Amir
    Khazaei, Shahram
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (08) : 5364 - 5385
  • [42] Anonymous secret sharing schemes
    Blundo, C
    Stinson, DR
    DISCRETE APPLIED MATHEMATICS, 1997, 77 (01) : 13 - 28
  • [43] Two secret sharing schemes based on Boolean operations
    Wang, Daoshun
    Zhang, Lei
    Ma, Ning
    Li, Xiaobo
    PATTERN RECOGNITION, 2007, 40 (10) : 2776 - 2785
  • [44] Cryptanalysis of secret sharing schemes based on spherical spaces
    Chervyakov, N. J.
    Babenko, M. G.
    Deryabin, M. A.
    Nazarov, A. S.
    2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT), 2014, : 11 - 15
  • [45] A Survey of Secret Sharing Schemes Based on Latin Squares
    Tso, Raylin
    Miao, Ying
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT II, 2018, 82 : 267 - 272
  • [46] Study of secret sharing schemes based on quantum theory
    Key Lab. of Computer Networks and Information Security of Ministry of Education, Xidian University, Xi'an 710071, China
    不详
    Tongxin Xuebao, 2009, 11 A (127-132+139):
  • [47] Secret Sharing Schemes Based on Min-Entropies
    Iwamoto, Mitsugu
    Shikata, Junji
    2014 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2014, : 401 - 405
  • [48] Secret sharing schemes based on the dual of Golay codes
    Jian Ding
    Changlu Lin
    Sihem Mesnager
    Cryptography and Communications, 2021, 13 : 1025 - 1041
  • [49] Explication of secret sharing schemes
    Stinson, D.R.
    Designs, Codes, and Cryptography, 1992, 2 (04)
  • [50] Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes
    Eriguchi, Reo
    Kunihiro, Noboru
    2019 IEEE INFORMATION THEORY WORKSHOP (ITW), 2019, : 264 - 268