Efficient explicit constructions of compartmented secret sharing schemes

被引:0
作者
Qi Chen
Chunming Tang
Zhiqiang Lin
机构
[1] Guangzhou University,Advanced Institute of Engineering Science for Intelligent Manufacturing
[2] Guangzhou University,College of Mathematics and Information Science
[3] Guangzhou University,Key Laboratory of Mathematics and Interdisciplinary Sciences of Guangdong Higher Education Institutes
来源
Designs, Codes and Cryptography | 2019年 / 87卷
关键词
Secret sharing schemes; Multipartite access structures; Compartmented access structures; Matroids; Polymatroids; Gabidulin codes; 94A62; 94B05;
D O I
暂无
中图分类号
学科分类号
摘要
Multipartite secret sharing schemes have been an important object of study in the area of secret sharing schemes. Two interesting families of multipartite access structures are hierarchical access structures and compartmented access structures. This work deals with efficient and explicit constructions of ideal compartmented secret sharing schemes, while most of the known constructions are either inefficient or randomized. We construct ideal linear secret sharing schemes for three types of compartmented access structures, such as compartmented access structures with upper bounds, compartmented access structures with lower bounds, and compartmented access structures with upper and lower bounds. There exist some methods to construct ideal linear schemes realizing these compartmented access structures in the literature, but those methods are inefficient in general because non-singularity of many matrices has to be determined to check the correctness of the scheme. Our constructions do not need to do these computations. Our methods to construct ideal linear schemes realizing these access structures combine polymatroid-based techniques with Gabidulin codes. Gabidulin codes play a fundamental role in the constructions, and their properties imply that our methods are efficient.
引用
收藏
页码:2913 / 2940
页数:27
相关论文
共 39 条
[1]  
Ball S(2013)On the representability of the biuniform matroid SIAM J. Discret. Math. 27 1482-1491
[2]  
Padró C(1994)Universally ideal secret sharing schemes IEEE Trans. Inf. Theory 40 786-794
[3]  
Weiner Z(2008)Characterizing ideal weighted threshold secret sharing SIAM J. Discret. Math. 22 360-397
[4]  
Xing C(1993)On 2-level secret sharing Des. Codes Cryptogr. 3 127-134
[5]  
Beimel A(1989)Some ideal secret sharing schemes J. Comb. Math. Comb. Comp. 9 105-113
[6]  
Chor B(1991)On the classification of ideal secret sharing schemes J. Cryptol. 4 123-134
[7]  
Beimel A(1993)Secret sharing over infinite domains J. Cryptol. 6 87-96
[8]  
Tassa T(2012)Ideal hierarchical secret sharing schemes IEEE Trans. Inf. Theory 58 3273-3286
[9]  
Weinreb E(2012)Ideal multipartite secret sharing schemes J. Cryptol. 25 434-463
[10]  
Beutelspacher A(2014)Natural generalizations of threshold secret sharing IEEE Trans. Inf. Theory 60 1652-1664