The complexity and randomness of linear multi-secret sharing schemes with non-threshold structures

被引:1
作者
Tang, Chun-ming [1 ,2 ,3 ]
Dai, Shu-guang [4 ]
机构
[1] Guangzhou Univ, Sch Math & Informat Sci, Guangzhou 510006, Guangdong, Peoples R China
[2] Guangzhou Univ, Key Lab Math & Interdisciplinary Sci Guangdong Hi, Guangzhou 510006, Guangdong, Peoples R China
[3] State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Sun Yat Sen Univ, Sch Informat Sci & Technol, Guangzhou 510006, Guangdong, Peoples R China
基金
中国国家自然科学基金; 新加坡国家研究基金会;
关键词
secret sharing; multi-secret sharing scheme; non-threshold multi-access structure; linear code; complexity; randomness; ACCESS STRUCTURE;
D O I
10.1007/s10255-014-0431-7
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In a linear multi-secret sharing scheme with non-threshold structures, several secret values are shared among n participants, and every secret value has a specified access structure. The efficiency of a multi-secret sharing scheme is measured by means of the complexity sigma and the randomness tau. Informally, the complexity sigma is the ratio between the maximum of information received by each participant and the minimum of information corresponding to every key. The randomness tau is the ratio between the amount of information distributed to the set of users U = {1, a <-, n} and the minimum of information corresponding to every key. In this paper, we discuss sigma and tau of any linear multi-secret sharing schemes realized by linear codes with non-threshold structures, and provide two algorithms to make sigma and tau to be the minimum, respectively. That is, they are optimal.
引用
收藏
页码:1073 / 1084
页数:12
相关论文
共 50 条
[31]   A (t, n) multi-secret sharing scheme [J].
Yang, CC ;
Chang, TY ;
Hwang, MS .
APPLIED MATHEMATICS AND COMPUTATION, 2004, 151 (02) :483-490
[32]   Finding lower bounds on the complexity of secret sharing schemes by linear programming [J].
Padro, Carles ;
Vazquez, Leonor ;
Yang, An .
DISCRETE APPLIED MATHEMATICS, 2013, 161 (7-8) :1072-1084
[33]   An efficient (t, n) multi-secret sharing scheme with verification [J].
Pang, L. J. ;
Li, H. X. ;
Jiao, L. C. ;
Wang, Y. M. .
2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, :552-557
[34]   On the Dealer's Randomness Required in Secret Sharing Schemes [J].
Blundo C. ;
Gaggia A.G. ;
Stinson D.R. .
Designs, Codes and Cryptography, 1997, 11 (3) :235-259
[35]   An extensible cheat-proofing multi-secret sharing scheme with low computation complexity [J].
Wu, Yinfeng ;
Huang, Liping ;
Wang, Xiao ;
Yu, Ning .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (06) :1042-1048
[36]   An efficient Boolean based multi-secret image sharing scheme [J].
Nag, Amitava ;
Singh, Jyoti Prakash ;
Singh, Amit Kumar .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (23-24) :16219-16243
[37]   An efficient Boolean based multi-secret image sharing scheme [J].
Amitava Nag ;
Jyoti Prakash Singh ;
Amit Kumar Singh .
Multimedia Tools and Applications, 2020, 79 :16219-16243
[38]   A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure [J].
Alam, Irfan ;
Alali, Amal S. ;
Ali, Shakir ;
Asri, Muhammad S. M. .
AXIOMS, 2024, 13 (08)
[39]   New efficient and practical v-fairness (t, n) multi-secret sharing schemes [J].
Yang, Wenjie ;
Zhang, Futai .
Advances in Information Sciences and Service Sciences, 2012, 4 (23) :265-273
[40]   Application of multi-secret sharing schemes using LCD codes over R = R[w] [J].
Chatouh, Karima ;
Mokhtari, Dejia ;
Guenda, Kenza .
COMPUTATIONAL & APPLIED MATHEMATICS, 2025, 44 (01)