Linear secret sharing schemes and rearrangements of access structures

被引:4
|
作者
Xiao L.-L. [1 ]
Liu M.-L. [2 ]
机构
[1] Institute of Software, State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing
[2] Academy of Mathematics and Systems Science, Key Laboratory of Mathematics Mechanization, Chinese Academy of Sciences, Beijing
基金
中国国家自然科学基金;
关键词
Access structure; Linear secret sharing scheme; Monotone span program; Rearrangement of access structure;
D O I
10.1007/s10255-004-0206-7
中图分类号
学科分类号
摘要
In this paper we study linear secret sharing schemes by monotone span programs, according to the relation between realizing access structures by linear secret sharing schemes and computing monotone Boolean functions by monotone span programs. We construct some linear secret sharing schemes. Furthermore, we study the rearrangements of access structures that is very important in practice. © Springer-Verlag 2004.
引用
收藏
页码:685 / 694
页数:9
相关论文
共 50 条
  • [1] Rearrangements of access structures and their realizations in secret sharing schemes
    Zhang, Zhifang
    Liu, Mulan
    Xiao, Liangliang
    [J]. DISCRETE MATHEMATICS, 2008, 308 (21) : 4882 - 4891
  • [2] Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
    Beimel, Amos
    Farras, Oriol
    Mintz, Yuval
    Peter, Naty
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (03) : 2083 - 2100
  • [3] Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
    Beimel, Amos
    Farras, Oriol
    Mintz, Yuval
    Peter, Naty
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2017, PT II, 2017, 10678 : 394 - 423
  • [4] Access structures of elliptic secret sharing schemes
    Chen, Hao
    Ling, San
    Xing, Chaoping
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (02) : 850 - 852
  • [5] Secret sharing schemes with nice access structures
    Ding, Cunsheng
    Salomaa, Arto
    [J]. FUNDAMENTA INFORMATICAE, 2006, 73 (1-2) : 51 - 62
  • [6] Secret sharing schemes for compartmented access structures
    Wang, Xianfang
    Xiang, Can
    Fu, Fang-Wei
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2017, 9 (05): : 625 - 635
  • [7] Secret sharing schemes for compartmented access structures
    Xianfang Wang
    Can Xiang
    Fang-Wei Fu
    [J]. Cryptography and Communications, 2017, 9 : 625 - 635
  • [8] Secret Sharing Schemes with General Access Structures
    Liu, Jian
    Mesnager, Sihem
    Chen, Lusheng
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 341 - 360
  • [9] Access structures of hyperelliptic secret sharing schemes
    Yang, Siman
    Wu, Hongfeng
    Lie, Jiyou
    [J]. FINITE FIELDS AND THEIR APPLICATIONS, 2016, 37 : 46 - 53
  • [10] Optimal linear secret sharing schemes for graph access structures on six participants
    Gharahi, Motahhareh
    Khazaei, Shahram
    [J]. THEORETICAL COMPUTER SCIENCE, 2019, 771 : 1 - 8