DECOMPOSITION CONSTRUCTION FOR SECRET SHARING SCHEMES WITH GRAPH ACCESS STRUCTURES IN POLYNOMIAL TIME

被引:6
作者
Sun, Hung-Min [1 ]
Wang, Huaxiong [2 ,3 ]
Ku, Bying-He [1 ]
Pieprzyk, Josef [3 ]
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 30013, Taiwan
[2] Nanyang Technol Univ, Sch Phys & Math Sci, Div Math Sci, Singapore, Singapore
[3] Macquarie Univ, Dept Comp, N Ryde, NSW 2109, Australia
基金
新加坡国家研究基金会; 澳大利亚研究理事会;
关键词
secret sharing scheme; graph access structure; linear programming; information rate; PERFECT; CODES;
D O I
10.1137/080733802
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The purpose of this paper is to describe a new decomposition construction for perfect secret sharing schemes with graph access structures. The previous decomposition construction proposed by Stinson is a recursive method that uses small secret sharing schemes as building blocks in the construction of larger schemes. When the Stinson method is applied to the graph access structures, the number of such "small" schemes is typically exponential in the number of the participants, resulting in an exponential algorithm. Our method has the same flavor as the Stinson decomposition construction; however, the linear programming problem involved in the construction is formulated in such a way that the number of "small" schemes is polynomial in the size of the participants, which in turn gives rise to a polynomial time construction. We also show that if we apply the Stinson construction to the "small" schemes arising from our new construction, both have the same information rate.
引用
收藏
页码:617 / 638
页数:22
相关论文
共 32 条
[1]  
[Anonymous], 1979, P AFIPS NAT COMP C N
[2]  
[Anonymous], 1987, P 19 ANN ACM S THEOR
[3]  
[Anonymous], 1979, Sov. Math. Dokl
[4]   Characterizing ideal weighted threshold secret sharing [J].
Beimel, Amos ;
Tassa, Tamir ;
Weinreb, Enav .
SIAM JOURNAL ON DISCRETE MATHEMATICS, 2008, 22 (01) :360-397
[5]  
BENALOH J, 1988, LNCS, V403, P27
[6]  
BLAKLEY B, 1993, LECT NOTES COMPUTER, V740, P540
[7]   Tight Bounds on the Information Rate of Secret Sharing Schemes [J].
Carlo Blundo ;
Alfredo De Santis ;
Roberto De Simone ;
Ugo Vaccaro .
Designs, Codes and Cryptography, 1997, 11 (2) :107-110
[8]   GRAPH DECOMPOSITIONS AND SECRET SHARING SCHEMES [J].
BLUNDO, C ;
DESANTIS, A ;
STINSON, DR ;
VACCARO, U .
JOURNAL OF CRYPTOLOGY, 1995, 8 (01) :39-64
[9]  
Brickell E. F., 1991, Journal of Cryptology, V4, P123, DOI 10.1007/BF00196772
[10]  
Brickell E. F., 1992, Journal of Cryptology, V5, P153, DOI 10.1007/BF02451112