Secret Sharing Based On Cartesian product Of Graphs

被引:1
|
作者
Maimani, Hamidreza [1 ]
Norozi, Zynolabedin [2 ]
机构
[1] Shahid Rajaee Teacher Training Univ, Dept Math, Tehran, Iran
[2] Emam Hossen Univ, Dept Secur & Cryptog, Tehran, Iran
来源
IRANIAN JOURNAL OF MATHEMATICAL SCIENCES AND INFORMATICS | 2013年 / 8卷 / 02期
关键词
Secret sharing; Cartesian graph product; Prism graph;
D O I
10.7508/ijnisi.2013.02.003
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The purpose of this paper is to study the information ratio of perfect secret sharing of product of some special families of graphs. We seek to prove that the information ratio of prism graphs 17 are equal to7/4 for any n >= 5, and we will gave a partial answer to a question of Csirmaz [10]. We will also study the information ratio of two other families C-m x C-n and P-m x C-n and obtain the exact value of information ratio of these graphs.
引用
收藏
页码:31 / 38
页数:8
相关论文
共 50 条
  • [41] Secret sharing schemes based on the dual of Golay codes
    Ding, Jian
    Lin, Changlu
    Mesnager, Sihem
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2021, 13 (06): : 1025 - 1041
  • [42] Analysis of secret sharing schemes based on Nielsen transformations
    Kotov, Matvei
    Panteleev, Dmitry
    Ushakov, Alexander
    GROUPS COMPLEXITY CRYPTOLOGY, 2018, 10 (01) : 1 - 8
  • [43] Secret sharing based on a hard-on-average problem
    Caballero-Gil, P
    Hernández-Goya, C
    LINEAR ALGEBRA AND ITS APPLICATIONS, 2006, 414 (2-3) : 626 - 631
  • [44] A Novel Behavior Steganography Model Based on Secret Sharing
    Liu, Hanlin
    Liu, Jingju
    Yan, Xuehu
    Liu, Lintao
    Ding, Wanmeng
    Jiang, Yue
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2019, 11 (04) : 97 - 117
  • [45] A Multiple Secret Sharing Scheme based on Matrix Projection
    Wang, Kai
    Zou, Xukai
    Sui, Yan
    2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2009, : 400 - 405
  • [46] Color image encryption based on secret sharing and iterations
    Luo H.
    Yu F.-X.
    Li H.
    Huang Z.-L.
    Information Technology Journal, 2010, 9 (03) : 446 - 452
  • [47] Secret image sharing based on multiphase retrieval algorithm
    Zhao, Tieyu
    Chi, Yingying
    JOURNAL OF MODERN OPTICS, 2020, 67 (15) : 1296 - 1303
  • [48] A Quantum Sealed Auction Protocol Based on Secret Sharing
    Wang, Qing
    Shi, Run-hua
    Chen, Zhang-kai
    Wang, Sheng-lan
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (04) : 1128 - 1137
  • [49] An Effective RFID Security Protocol Based on Secret Sharing
    Gao, Zhijian
    Jiang, Yi
    Lin, Zhenxiong
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 780 - 784
  • [50] A forward-secure scheme based on secret sharing
    Zhang, Jing
    Wei, Feng
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 1134 - 1138