A Linear Construction of Secret Sharing Schemes

被引:22
|
作者
Marten van Dijk
机构
[1] Eindhoven University of Technology,Department of Mathematics and Computing Science
关键词
cryptography; secret sharing; search algorithm; ideal linear schemes; matrix description;
D O I
10.1023/A:1008259214236
中图分类号
学科分类号
摘要
In this paper, we will generalize the vector space construction due to Brickell. This generalization, introduced by Bertilsson, leads to secret sharing schemes with rational information rates in which the secret can be computed efficiently by each qualified group. A one to one correspondence between the generalized construction and linear block codes is stated, and a matrix characterization of the generalized construction is presented. It turns out that the approach of minimal codewords by Massey is a special case of this construction. For general access structures we present an outline of an algorithm for determining whether a rational number can be realized as information rate by means of the generalized vector space construction. If so, the algorithm produces a secret sharing scheme with this information rate.
引用
收藏
页码:161 / 201
页数:40
相关论文
共 50 条
  • [41] Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
    Beimel, Amos
    Farras, Oriol
    Mintz, Yuval
    Peter, Naty
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2017, PT II, 2017, 10678 : 394 - 423
  • [42] Finding lower bounds on the complexity of secret sharing schemes by linear programming
    Padro, Carles
    Vazquez, Leonor
    Yang, An
    [J]. DISCRETE APPLIED MATHEMATICS, 2013, 161 (7-8) : 1072 - 1084
  • [43] An efficient construction of perfect secret sharing schemes for graph-based structures
    Sun, HM
    Shieh, SP
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1996, 31 (07) : 129 - 135
  • [44] DECOMPOSITION CONSTRUCTION FOR SECRET SHARING SCHEMES WITH GRAPH ACCESS STRUCTURES IN POLYNOMIAL TIME
    Sun, Hung-Min
    Wang, Huaxiong
    Ku, Bying-He
    Pieprzyk, Josef
    [J]. SIAM JOURNAL ON DISCRETE MATHEMATICS, 2010, 24 (02) : 617 - 638
  • [45] Visual secret sharing schemes for plural secret images
    Iwamoto, M
    Yamamoto, H
    [J]. 2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 283 - 283
  • [46] Verifiable Secret Redistribution for Proactive Secret Sharing Schemes
    于佳
    孔凡玉
    李大兴
    [J]. Journal of Shanghai Jiaotong University(Science), 2006, (02) : 236 - 241
  • [47] Linear codes from weakly regular plateaued functions and their secret sharing schemes
    Mesnager, Sihem
    Ozbudak, Ferruh
    Sinak, Ahmet
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (2-3) : 463 - 480
  • [48] Optimal linear secret sharing schemes for graph access structures on six participants
    Gharahi, Motahhareh
    Khazaei, Shahram
    [J]. THEORETICAL COMPUTER SCIENCE, 2019, 771 : 1 - 8
  • [49] Linear codes from weakly regular plateaued functions and their secret sharing schemes
    Sihem Mesnager
    Ferruh Özbudak
    Ahmet Sınak
    [J]. Designs, Codes and Cryptography, 2019, 87 : 463 - 480
  • [50] Strong security of linear ramp secret sharing schemes with general access structures
    Eriguchi, Reo
    Kunihiro, Noboru
    [J]. INFORMATION PROCESSING LETTERS, 2020, 164