Linear secret sharing schemes and rearrangements of access structures

被引:5
|
作者
Xiao L.-L. [1 ]
Liu M.-L. [2 ]
机构
[1] Institute of Software, State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing
[2] Academy of Mathematics and Systems Science, Key Laboratory of Mathematics Mechanization, Chinese Academy of Sciences, Beijing
基金
中国国家自然科学基金;
关键词
Access structure; Linear secret sharing scheme; Monotone span program; Rearrangement of access structure;
D O I
10.1007/s10255-004-0206-7
中图分类号
学科分类号
摘要
In this paper we study linear secret sharing schemes by monotone span programs, according to the relation between realizing access structures by linear secret sharing schemes and computing monotone Boolean functions by monotone span programs. We construct some linear secret sharing schemes. Furthermore, we study the rearrangements of access structures that is very important in practice. © Springer-Verlag 2004.
引用
收藏
页码:685 / 694
页数:9
相关论文
共 50 条
  • [21] Strongly secure ramp secret sharing schemes for general access structures
    Iwamoto, M
    Yamamoto, H
    INFORMATION PROCESSING LETTERS, 2006, 97 (02) : 52 - 57
  • [22] Constructing perfect secret sharing schemes for general and uniform access structures
    Sun, HM
    Shieh, SP
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 1999, 15 (05) : 679 - 689
  • [23] Secret sharing schemes on access structures with intersection number equal to one
    Martí-Farré, J
    Padró, C
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (03) : 552 - 563
  • [24] Perfect secret sharing schemes for graph access structures on six participants
    Gharahi, Motahhareh
    Dehkordi, Massoud Hadian
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2013, 7 (02) : 143 - 146
  • [25] On multiplicative linear secret sharing schemes
    Nikov, V
    Nikova, S
    Preneel, B
    PROGRESS IN CRYPTOLOGY -INDOCRYPT 2003, 2003, 2904 : 135 - 147
  • [26] A Linear Construction of Secret Sharing Schemes
    Marten van Dijk
    Designs, Codes and Cryptography, 1997, 12 (2) : 161 - 201
  • [27] Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes
    Eriguchi, Reo
    Kunihiro, Noboru
    2019 IEEE INFORMATION THEORY WORKSHOP (ITW), 2019, : 264 - 268
  • [28] Verifiable multi-secret sharing schemes for multiple threshold access structures
    Tartary, Christophe
    Pieprzyk, Josef
    Wang, Huaxiong
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 167 - +
  • [29] DECOMPOSITION CONSTRUCTION FOR SECRET SHARING SCHEMES WITH GRAPH ACCESS STRUCTURES IN POLYNOMIAL TIME
    Sun, Hung-Min
    Wang, Huaxiong
    Ku, Bying-He
    Pieprzyk, Josef
    SIAM JOURNAL ON DISCRETE MATHEMATICS, 2010, 24 (02) : 617 - 638
  • [30] Secret sharing schemes with bipartite access structure
    Padrö, Carles
    Sâez, German
    2000, IEEE, Piscataway, NJ, United States (46)