Secret Sharing Schemes for (k, n)-Consecutive Access Structures

被引:2
|
作者
Herranz, Javier [1 ,2 ]
Saez, German [1 ,2 ]
机构
[1] Univ Politecn Cataluna, Dept Matemat, C Jordi Girona 1-3, Barcelona 08034, Spain
[2] CYBERCAT Ctr Cybersecur Res Catalonia, Barcelona, Spain
来源
CRYPTOLOGY AND NETWORK SECURITY, CANS 2018 | 2018年 / 11124卷
关键词
Secret sharing schemes; Ideal access structures; Information rate; DECOMPOSITION;
D O I
10.1007/978-3-030-00434-7_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider access structures over a set P of n participants, defined by a parameter k with 1 <= k <= n in the following way: a subset is authorized if it contains participants i, i + 1, ... , i + k - 1, for some i is an element of {1, ... , n - k + 1}. We call such access structures, which may naturally appear in real applications involving distributed cryptography, (k, n)-consecutive. We prove that these access structures are only ideal when k = 1, n - 1, n. Actually, we obtain the same result that has been obtained for other families of access structures: being ideal is equivalent to being a vector space access structure and is equivalent to having an optimal information rate strictly bigger than 2/3. For the non-ideal cases, we give either the exact value of the optimal information rate, for k = n - 2 and k = n - 3, or some bounds on it.
引用
收藏
页码:463 / 480
页数:18
相关论文
共 50 条
  • [41] On ideal homomorphic secret sharing schemes and their decomposition
    Fatemeh Ghasemi
    Reza Kaboli
    Shahram Khazaei
    Maghsoud Parviz
    Mohammad-Mahdi Rafiei
    Designs, Codes and Cryptography, 2021, 89 : 2079 - 2096
  • [42] Secret sharing schemes based on extension fields
    Calkavur, Selda
    EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2018, 11 (02): : 410 - 416
  • [43] Applying secret sharing schemes to service reputation
    Namin, AS
    Wei, RZ
    Shen, WM
    Ghenniwa, H
    PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS 1 AND 2, 2005, : 696 - 703
  • [44] Secret Sharing Schemes for Dense Forbidden Graphs
    Beimel, Amos
    Farras, Oriol
    Peter, Naty
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016, 2016, 9841 : 509 - 528
  • [45] DECOMPOSITION CONSTRUCTIONS FOR SECRET-SHARING SCHEMES
    STINSON, DR
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (01) : 118 - 125
  • [46] ON THE COMPOSITION OF SECRET SHARING SCHEMES RELATED TO CODES
    Marquez-Corbella, I.
    Martinez-Moro, E.
    Suarez-Canedo, E.
    DISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS, 2014, 6 (01)
  • [47] Secret sharing schemes based on combinatorial designs
    Song, YJ
    Kurosawa, S
    Satoh, T
    Tsujii, S
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART III-FUNDAMENTAL ELECTRONIC SCIENCE, 1995, 78 (10): : 20 - 26
  • [48] Threshold changeable secret sharing schemes revisited
    Zhang, Zhifang
    Chee, Yeow Meng
    Ling, San
    Liu, Mulan
    Wang, Huaxiong
    THEORETICAL COMPUTER SCIENCE, 2012, 418 : 106 - 115
  • [49] Robust vector space secret sharing schemes
    Padro, C
    INFORMATION PROCESSING LETTERS, 1998, 68 (03) : 107 - 111
  • [50] Compartmented Secret Sharing Schemes and Locally Repairable Codes
    Chen, Qi
    Tang, Chunming
    Lin, Zhiqiang
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (10) : 5976 - 5987