共查询到20条相似文献,搜索用时 0 毫秒
1.
In this paper we provide upper and lower bounds on the randomness required by the dealer to set up a secret sharing scheme for infinite classes of access structures. Lower bounds are obtained using entropy arguments. Upper bounds derive from a decomposition construction based on combinatorial designs (in particular, t-(v,k,) designs). We prove a general result on the randomness needed to construct a scheme for the cycle Cn; when n is odd our bound is tight. We study the access structures on at most four participants and the connected graphs on five vertices, obtaining exact values for the randomness for all them. Also, we analyze the number of random bits required to construct anonymous threshold schemes, giving upper bounds. (Informally, anonymous threshold schemes are schemes in which the secret can be reconstructed without knowledge of which participants hold which shares.) 相似文献
2.
In this paper we study secret sharing schemes whose access structure has three or four minimal qualified subsets. The ideal case is completely characterized and for the non-ideal case we provide bounds on the optimal information rate.AMS Classification 94A62 相似文献
3.
Shoulun Long Josef Pieprzyk Huaxiong Wang Duncan S. Wong 《Designs, Codes and Cryptography》2006,40(2):191-209
Cumulative arrays have played an important role in the early development of the secret sharing theory. They have not been
subject to extensive study so far, as the secret sharing schemes built on them generally result in much larger sizes of shares,
when compared with other conventional approaches. Recent works in threshold cryptography show that cumulative arrays may be
the appropriate building blocks in non-homomorphic threshold cryptosystems where the conventional secret sharing methods are
generally of no use. In this paper we study several extensions of cumulative arrays and show that some of these extensions
significantly improve the performance of conventional cumulative arrays. In particular, we derive bounds on generalised cumulative
arrays and show that the constructions based on perfect hash families are asymptotically optimal. We also introduce the concept
of ramp perfect hash families as a generalisation of perfect hash families for the study of ramp secret sharing schemes and
ramp cumulative arrays. 相似文献
4.
A secret sharing scheme for an incomplete access structure (,) is a method of distributing information about a secret among a group of participants in such a way that sets of participants in can reconstruct the secret and sets of participants in can not obtain any new information about the secret. In this paper we present a more precise definition of secret sharing schemes in terms of information theory, and a new decomposition theorem. This theorem generalizes previous decomposition theorems and also works for a more general class of access structures. We demonstrate some applications of the theorem. 相似文献
5.
Mida Guillermo Keith M. Martin Christine M. O'Keefe 《Designs, Codes and Cryptography》2003,28(3):227-245
We discuss the concept of anonymity in an unconditionally secure secret sharing scheme, proposing several types of anonymity and situations in which they might arise. We present a foundational framework and provide a range of general constructions of unconditionally secure secret sharing schemes offering various degrees of anonymity. 相似文献
6.
Tight Bounds on the Information Rate of Secret Sharing Schemes 总被引:4,自引:0,他引:4
Carlo Blundo Alfredo De Santis Roberto De Simone Ugo Vaccaro 《Designs, Codes and Cryptography》1997,11(2):107-110
A secret sharing scheme is a protocol by means of which a dealer distributes a secret s among a set of participants P in such a way that only qualified subsets of P can reconstruct the value of s whereas any other subset of P, non-qualified to know s, cannot determine anything about the value of the secret.In this paper we provide a general technique to prove upper bounds on the information rate of secret sharing schemes. The information rate is the ratio between the size of the secret and the size of the largest share given to any participant. Most of the recent upper bounds on the information rate obtained in the literature can be seen as corollaries of our result. Moreover, we prove that for any integer d there exists a d-regular graph for which any secret sharing scheme has information rate upper bounded by 2/(d+1). This improves on van Dijk's result dik and matches the corresponding lower bound proved by Stinson in [22]. 相似文献
7.
Detection of Cheaters in Vector Space Secret Sharing Schemes 总被引:23,自引:0,他引:23
A perfect secret sharing scheme is a method of distributing shares of a secret among a set P of participants in such a way that only qualified subsets of P can reconstruct the secret from their shares and non-qualified subsets have absolutely no information on the value of the secret. In a secret sharing scheme, some participants could lie about the value of their shares in order to obtain some illicit benefit. Therefore, the security against cheating is an important issue in the implementation of secret sharing schemes. Two new secret sharing schemes in which cheaters are detected with high probability are presented in this paper. The first one has information rate equal to 1/2 and can be implemented not only in threshold structures, but in a more general family of access structures. We prove that the information rate of this scheme is almost optimal among all schemes with the same security requirements. The second scheme we propose is a threshold scheme in which cheaters are detected with high probability even if they know the secret. The information rate is in this case 1/3 In both schemes, the probability of cheating successfully is a fixed value that is determined by the size of the secret. 相似文献
8.
In a secret sharing scheme, some participants can lie about the value of their shares when reconstructing the secret in order to obtain some illicit benefit. We present in this paper two methods to modify any linear secret sharing scheme in order to obtain schemes that are unconditionally secure against that kind of attack. The schemes obtained by the first method are robust, that is, cheaters are detected with high probability even if they know the value of the secret. The second method provides secure schemes, in which cheaters that do not know the secret are detected with high probability. When applied to ideal linear secret sharing schemes, our methods provide robust and secure schemes whose relation between the probability of cheating and the information rate is almost optimal. Besides, those methods make it possible to construct robust and secure schemes for any access structure. 相似文献
9.
《代数通讯》2013,41(12):4713-4731
Abstract Let S be a numerical semigroup and let I be a relative ideal of S. Let S ? I denote the dual of I and let μ S (?) represent the size of a minimal generating set. We investigate the inequality μ S (I)μ S (S ? I) ≥ μ S (I + (S ? I)) under the assumption that S has multiplicity 8. We will show that if I is non-principal, then the strict inequality μ S (I)μ S (S ? I) > μ S (I + (S ? I)) always holds. 相似文献
10.
11.
Ying-pu Deng Li-feng Guo Mu-lan Liu 《应用数学学报(英文版)》2007,23(1):67-78
In an anonymous secret sharing scheme the secret can be reconstructed without knowledge ofwhich participants hold which shares.In this paper some constructions of anonymous secret sharing schemeswith 2 thresholds by using combinatorial designs are given.Let v(t,w,q)denote the minimum size of the setof shares of a perfect anonymous(t,w)threshold secret sharing scheme with q secrets.In this paper we provethat v(t,w,q)=(q)if t and w are fixed and that the lower bound of the size of the set of shares in[4]is notoptimal under certain condition. 相似文献
12.
Wen-Ai Jackson Keith M. Martin Christine M. O'Keefe 《Designs, Codes and Cryptography》1996,9(3):287-303
A multisecret threshold scheme is a system that protects a number of secrets (or keys) among a group of participants, as follows. Given a set of n participants, there is a secret s
K
associated with each k–subset K of these participants. The scheme ensures that s
K
can be reconstructed by any group of t participants in K (
). A lower bound has been established on the amount of information that participants must hold in order to ensure that any set of up to w participants
cannot obtain any information about a secret with which they are not associated. In this paper, for parameters t=2 and w=n-k+t-1, we give a construction for multisecret threshold schemes that satisfy this bound. 相似文献
13.
Nicholas J. Cavenagh 《组合设计杂志》2013,21(6):253-266
If D is a partially filled‐in (0, 1)‐matrix with a unique completion to a (0, 1)‐matrix M (with prescribed row and column sums), we say that D is a defining set for M. If the removal of any entry of D destroys this property (i.e. at least two completions become possible), we say that D is a critical set for M. In this note, we show that the complement of a critical set for a (0, 1)‐matrix M is a defining set for M. We also study the possible sizes (number of filled‐in cells) of defining sets for square matrices M with uniform row and column sums, which are also frequency squares. In particular, we show that when the matrix is of even order 2m and the row and column sums are all equal to m, the smallest possible size of a critical set is precisely m2. We give the exact structure of critical sets with this property. © 2012 Wiley Periodicals, Inc. J. Combin. Designs 21: 253–266, 2013 相似文献
14.
Liang-liangXiao Mu-lanLiu 《应用数学学报(英文版)》2004,20(4):685-694
In this paper we study linear secret sharing schemes by monotone span programs, according to the relation between realizing access structures by linear secret sharing schemes and computing monotone Boolean functions by monotone span programs. We construct some linear secret sharing schemes. Furthermore, we study the rearrangements of access structures that is very important in practice. 相似文献
15.
In this paper we consider the (t, n)-threshold visual secret sharing scheme (VSSS) in which black pixels in a secret black-white images is reproduced perfectly
as black pixels when we stack arbitrary t shares. This paper provides a new characterization of the (t, n)-threshold visual secret sharing scheme with such a property (hereafter, we call such a VSSS the (t, n)-PBVSSS for short). We use an algebraic method to characterize basis matrices of the (t, n)-PBVSSS in a certain class of matrices. We show that the set of all homogeneous polynomials each element of which yields
basis matrices of the (t, n)-PBVSSS becomes a set of lattice points in an (n−t+1)-dimensional linear space. In addition, we prove that the optimal basis matrices in the sense of maximizing the relative
difference among all the basis matrices in the class coincides with the basis matrices given by Blundo, Bonis and De Santis
[3] for all n≥ t ≥ 2. 相似文献
16.
Constructions and Properties of k out of n Visual Secret Sharing Schemes 总被引:10,自引:0,他引:10
The idea of visual k out of n secret sharing schemes was introduced in Naor. Explicit constructions for k = 2 and k = n can be found there. For general k out of n schemes bounds have been described.Here, two general k out of n constructions are presented. Their parameters are related to those of maximum size arcs or MDS codes. Further, results on the structure of k out of n schemes, such as bounds on their parameters, are obtained. Finally, the notion of coloured visual secret sharing schemes is introduced and a general construction is given. 相似文献
17.
Siaw-Lynn Ng 《Designs, Codes and Cryptography》2003,30(1):5-19
Deciding whether a matroid is secret sharing or not is a well-known open problem. In Ng and Walker [6] it was shown that a matroid decomposes into uniform matroids under strong connectivity. The question then becomes as follows: when is a matroid m with N uniform components secret sharing? When N = 1, m corresponds to a uniform matroid and hence is secret sharing. In this paper we show, by constructing a representation using projective geometry, that all connected matroids with two uniform components are secret sharing 相似文献
18.
In this paper, we construct a scattered Cantor set having the value 1/2 of log2/log3- dimensional Hausdorff measure. Combining a theorem of Lee and Baek, we can see the value 21 is the minimal Hausdorff measure of the scattered Cantor sets, and our result solves a conjecture of Lee and Baek. 相似文献
19.
Yu Qing Chen 《Designs, Codes and Cryptography》1998,13(3):247-250
In this paper, we will give a construction of a family of
-difference sets in thegroup
, where q is any power of 2, K is any group with
and G is an abelian 2-group of order
which contains anelementary abelian subgroup of index 2. 相似文献
20.
Martin Bokler 《Designs, Codes and Cryptography》2001,24(2):131-144
In this paper minimal m-blocking sets of cardinality at most
in projective spaces PG(n,q) of square order q, q 16, are characterized to be (t, 2(m-t-1))-cones for some t with
. In particular we will find the smallest m-blocking sets that generate the whole space PG(n,q) for 2m n m. 相似文献