Efficient explicit constructions of compartmented secret sharing schemes

被引:0
|
作者
Qi Chen
Chunming Tang
Zhiqiang Lin
机构
[1] Guangzhou University,Advanced Institute of Engineering Science for Intelligent Manufacturing
[2] Guangzhou University,College of Mathematics and Information Science
[3] Guangzhou University,Key Laboratory of Mathematics and Interdisciplinary Sciences of Guangdong Higher Education Institutes
来源
关键词
Secret sharing schemes; Multipartite access structures; Compartmented access structures; Matroids; Polymatroids; Gabidulin codes; 94A62; 94B05;
D O I
暂无
中图分类号
学科分类号
摘要
Multipartite secret sharing schemes have been an important object of study in the area of secret sharing schemes. Two interesting families of multipartite access structures are hierarchical access structures and compartmented access structures. This work deals with efficient and explicit constructions of ideal compartmented secret sharing schemes, while most of the known constructions are either inefficient or randomized. We construct ideal linear secret sharing schemes for three types of compartmented access structures, such as compartmented access structures with upper bounds, compartmented access structures with lower bounds, and compartmented access structures with upper and lower bounds. There exist some methods to construct ideal linear schemes realizing these compartmented access structures in the literature, but those methods are inefficient in general because non-singularity of many matrices has to be determined to check the correctness of the scheme. Our constructions do not need to do these computations. Our methods to construct ideal linear schemes realizing these access structures combine polymatroid-based techniques with Gabidulin codes. Gabidulin codes play a fundamental role in the constructions, and their properties imply that our methods are efficient.
引用
收藏
页码:2913 / 2940
页数:27
相关论文
共 50 条
  • [1] Efficient explicit constructions of compartmented secret sharing schemes
    Chen, Qi
    Tang, Chunming
    Lin, Zhiqiang
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (12) : 2913 - 2940
  • [2] Efficient Explicit Constructions of Multipartite Secret Sharing Schemes
    Chen, Qi
    Tang, Chunming
    Lin, Zhiqiang
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT II, 2019, 11922 : 505 - 536
  • [3] Efficient Explicit Constructions of Multipartite Secret Sharing Schemes
    Chen, Qi
    Tang, Chunming
    Lin, Zhiqiang
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (01) : 601 - 631
  • [4] Secret sharing schemes for compartmented access structures
    Xianfang Wang
    Can Xiang
    Fang-Wei Fu
    [J]. Cryptography and Communications, 2017, 9 : 625 - 635
  • [5] Secret sharing schemes for compartmented access structures
    Wang, Xianfang
    Xiang, Can
    Fu, Fang-Wei
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2017, 9 (05): : 625 - 635
  • [6] Compartmented Secret Sharing Schemes and Locally Repairable Codes
    Chen, Qi
    Tang, Chunming
    Lin, Zhiqiang
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (10) : 5976 - 5987
  • [7] Recursive constructions for perfect secret sharing schemes
    Sun, HM
    Shieh, SP
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1999, 37 (03) : 87 - 96
  • [8] DECOMPOSITION CONSTRUCTIONS FOR SECRET-SHARING SCHEMES
    STINSON, DR
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (01) : 118 - 125
  • [9] Efficient Secret Sharing Schemes
    Lv, Chunli
    Jia, Xiaoqi
    Lin, Jingqiang
    Jing, Jiwu
    Tian, Lijun
    Sun, Mingli
    [J]. SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 114 - +
  • [10] Improved constructions of secret sharing schemes by applying (λ, ω)-decompositions
    van Dijk, Marten
    Kevenaar, Tom
    Schrijen, Geert-Jan
    Tuyls, Pim
    [J]. INFORMATION PROCESSING LETTERS, 2006, 99 (04) : 154 - 157