Secret Sharing Schemes for (k, n)-Consecutive Access Structures

被引:2
|
作者
Herranz, Javier [1 ,2 ]
Saez, German [1 ,2 ]
机构
[1] Univ Politecn Cataluna, Dept Matemat, C Jordi Girona 1-3, Barcelona 08034, Spain
[2] CYBERCAT Ctr Cybersecur Res Catalonia, Barcelona, Spain
来源
CRYPTOLOGY AND NETWORK SECURITY, CANS 2018 | 2018年 / 11124卷
关键词
Secret sharing schemes; Ideal access structures; Information rate; DECOMPOSITION;
D O I
10.1007/978-3-030-00434-7_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider access structures over a set P of n participants, defined by a parameter k with 1 <= k <= n in the following way: a subset is authorized if it contains participants i, i + 1, ... , i + k - 1, for some i is an element of {1, ... , n - k + 1}. We call such access structures, which may naturally appear in real applications involving distributed cryptography, (k, n)-consecutive. We prove that these access structures are only ideal when k = 1, n - 1, n. Actually, we obtain the same result that has been obtained for other families of access structures: being ideal is equivalent to being a vector space access structure and is equivalent to having an optimal information rate strictly bigger than 2/3. For the non-ideal cases, we give either the exact value of the optimal information rate, for k = n - 2 and k = n - 3, or some bounds on it.
引用
收藏
页码:463 / 480
页数:18
相关论文
共 50 条
  • [1] Secret Sharing Schemes with General Access Structures
    Liu, Jian
    Mesnager, Sihem
    Chen, Lusheng
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 341 - 360
  • [2] Secret sharing schemes for compartmented access structures
    Wang, Xianfang
    Xiang, Can
    Fu, Fang-Wei
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2017, 9 (05): : 625 - 635
  • [3] Secret sharing schemes for compartmented access structures
    Xianfang Wang
    Can Xiang
    Fang-Wei Fu
    Cryptography and Communications, 2017, 9 : 625 - 635
  • [4] Access structures of hyperelliptic secret sharing schemes
    Yang, Siman
    Wu, Hongfeng
    Lie, Jiyou
    FINITE FIELDS AND THEIR APPLICATIONS, 2016, 37 : 46 - 53
  • [5] Probabilistic Secret Sharing Schemes for Multipartite Access Structures
    Wang, Xianfang
    Fu, Fang-Wei
    Guang, Xuan
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (04) : 856 - 862
  • [6] Secret sharing schemes on access structures with intersection number equal to one
    Martí-Farré, J
    Padró, C
    SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 354 - 363
  • [7] Secret sharing schemes on access structures with intersection number equal to one
    Martí-Farré, J
    Padró, C
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (03) : 552 - 563
  • [8] Secret sharing schemes with bipartite access structure
    Padró, C
    Sáez, G
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (07) : 2596 - 2604
  • [9] Strongly secure ramp secret sharing schemes for general access structures
    Iwamoto, M
    Yamamoto, H
    INFORMATION PROCESSING LETTERS, 2006, 97 (02) : 52 - 57
  • [10] Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
    Beimel, Amos
    Farras, Oriol
    Mintz, Yuval
    Peter, Naty
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (03) : 2083 - 2100