Secret sharing schemes based on graphical codes

被引:0
|
作者
Ying Gao
Romar dela Cruz
机构
[1] Beihang University,School of Mathematics and Systems Science
[2] LMIB of the Ministry of Education,Division of Mathematical Sciences, School of Physical and Mathematical Sciences
[3] Nanyang Technological University,Institute of Mathematics, College of Science
[4] University of the Philippines Diliman,undefined
来源
关键词
Secret sharing; Linear code; Matroid; Graph; 94A62; 94B05; 05C50;
D O I
暂无
中图分类号
学科分类号
摘要
We study the access structure and multiplicativity of linear secret sharing schemes based on codes from complete graphs. First, we describe the access structure of the schemes based on cut-set and cycle codes. Second, we show that the class of access structures based on odd cycles cannot be realized by ideal multiplicative linear secret sharing schemes over any finite field. This can be seen as a contribution to the characterization of access structures of ideal multiplicative schemes. The access structure based on odd cycles corresponds to the scheme based on the dual of the extended cycle code. Finally, we show that we can obtain ideal multiplicative linear secret sharing scheme based on the dual of an augmented extended cycle code.
引用
收藏
页码:137 / 155
页数:18
相关论文
共 50 条
  • [41] Efficient Secret Sharing Schemes Based on Unauthorized Subsets
    Tochikubo, Kouya
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (10) : 2860 - 2867
  • [42] On Proactive Secret Sharing Schemes
    Nikov, V
    Nikova, S
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 308 - 325
  • [43] A Survey of Secret Sharing Schemes Based on Latin Squares
    Tso, Raylin
    Miao, Ying
    [J]. ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT II, 2018, 82 : 267 - 272
  • [44] Secret Sharing Schemes Based on Min-Entropies
    Iwamoto, Mitsugu
    Shikata, Junji
    [J]. 2014 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2014, : 401 - 405
  • [45] Cryptanalysis of secret sharing schemes based on spherical spaces
    Chervyakov, N. J.
    Babenko, M. G.
    Deryabin, M. A.
    Nazarov, A. S.
    [J]. 2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT), 2014, : 11 - 15
  • [46] Efficient secret sharing schemes based on authorized subsets
    Tochikubo, K
    Uyematsu, T
    Matsumoto, R
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (01) : 322 - 326
  • [47] PERFECT SECRET SHARING SCHEMES
    Parvatov, K. G.
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2008, 2 (02): : 50 - 57
  • [48] Secret sharing schemes on graphs
    Csirmaz, Laszlo
    [J]. STUDIA SCIENTIARUM MATHEMATICARUM HUNGARICA, 2007, 44 (03) : 297 - 306
  • [49] Partial Secret Sharing Schemes
    Jafari, Amir
    Khazaei, Shahram
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (08) : 5364 - 5385
  • [50] Anonymous secret sharing schemes
    Blundo, C
    Stinson, DR
    [J]. DISCRETE APPLIED MATHEMATICS, 1997, 77 (01) : 13 - 28