Linear secret sharing schemes and rearrangements of access structures

被引:5
|
作者
Xiao L.-L. [1 ]
Liu M.-L. [2 ]
机构
[1] Institute of Software, State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing
[2] Academy of Mathematics and Systems Science, Key Laboratory of Mathematics Mechanization, Chinese Academy of Sciences, Beijing
基金
中国国家自然科学基金;
关键词
Access structure; Linear secret sharing scheme; Monotone span program; Rearrangement of access structure;
D O I
10.1007/s10255-004-0206-7
中图分类号
学科分类号
摘要
In this paper we study linear secret sharing schemes by monotone span programs, according to the relation between realizing access structures by linear secret sharing schemes and computing monotone Boolean functions by monotone span programs. We construct some linear secret sharing schemes. Furthermore, we study the rearrangements of access structures that is very important in practice. © Springer-Verlag 2004.
引用
收藏
页码:685 / 694
页数:9
相关论文
共 50 条
  • [41] On the Local Leakage Resilience of Linear Secret Sharing Schemes
    Fabrice Benhamouda
    Akshay Degwekar
    Yuval Ishai
    Tal Rabin
    Journal of Cryptology, 2021, 34
  • [42] On the Local Leakage Resilience of Linear Secret Sharing Schemes
    Benhamouda, Fabrice
    Degwekar, Akshay
    Ishai, Yuval
    Rabin, Tal
    JOURNAL OF CRYPTOLOGY, 2021, 34 (02)
  • [43] On the Local Leakage Resilience of Linear Secret Sharing Schemes
    Benhamouda, Fabrice
    Degwekar, Akshay
    Ishai, Yuval
    Rabin, Tal
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 531 - 561
  • [44] Improved secret sharing with access structures in a hierarchy
    Liu, Yi
    Zhang, Ling
    Wang, Yumin
    APSCC: 2006 IEEE ASIA-PACIFIC CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2006, : 18 - +
  • [45] Efficient secret sharing with access structures in a hierarchy
    Lin, CH
    Lee, W
    AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 123 - 126
  • [46] Secret sharing schemes from binary linear codes
    Li, Zhihui
    Xue, Ting
    Lai, Hong
    INFORMATION SCIENCES, 2010, 180 (22) : 4412 - 4419
  • [47] Practical Threshold Signatures with Linear Secret Sharing Schemes
    Bozkurt, Ilker Nadi
    Kaya, Kamer
    Selcuk, Ali Aydm
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 167 - 178
  • [48] Secret sharing on regular bipartite access structures
    Gyarmati, Mate
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (05) : 1951 - 1971
  • [49] Secret sharing on regular bipartite access structures
    Máté Gyarmati
    Designs, Codes and Cryptography, 2023, 91 : 1951 - 1971
  • [50] Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures
    Iwamoto, Mitsugu
    Yamamoto, Hirosuke
    Ogawa, Hirohisa
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 101 - 112