๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Recursive constructions for perfect secret sharing schemes

โœ Scribed by Hung-Min Sun; Shiuh-Pyng Shieh


Publisher
Elsevier Science
Year
1999
Tongue
English
Weight
595 KB
Volume
37
Category
Article
ISSN
0898-1221

No coin nor oath required. For personal study only.

โœฆ Synopsis


A secret sharing scheme is a method which allows a secret to be shared among a set of participants in such a way that only qualified subsets of participants can recover the secret. A secret sharing scheme is called perfect if unqualified subsets of participants obtain no information regarding the secret. The information rate of a secret sharing scheme is defined to be the ratio between the size of secret and the maximum size of the shares. In this paper, we propose some recursive constructions for perfect secret sharing schemes with access structures of constant rank. Compared with the best previous constructions, our constructions have some improved lower bounds on the information rate.


๐Ÿ“œ SIMILAR VOLUMES


Some recursive constructions for perfect
โœ M. Atici; S. S. Magliveras; D. R. Stinson; W.-D. Wei ๐Ÿ“‚ Article ๐Ÿ“… 1996 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 452 KB

An (n, m, w)-perfect hash family is a set of functions F such that f : (1

An extended construction method for visu
โœ Taku Katoh; Hideki Imai ๐Ÿ“‚ Article ๐Ÿ“… 1998 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 348 KB

A visual secret sharing scheme permits a secret to be shared among participants using transparencies. In this paper, we consider an extended scheme for visual secret sharing. We propose an improved method of constructing the visual secret sharing scheme that can conceal some images in a series of t

Combinatorial lower bounds for secret sh
โœ Kaoru Kurosawa; Koji Okada ๐Ÿ“‚ Article ๐Ÿ“… 1996 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 286 KB

In a perfect secret sharing scheme, it holds that log, I%[ > H(S), where S denotes the secret and G denotes the set of the share of user i. On the other hand, it is well known that log213 > H(S) if S is not uniformly distributed, where ? denotes the set of secrets. In this case, log, @I > H(S) < log

On the size of shares for secret sharing
โœ R. M. Capocelli; A. De Santis; L. Gargano; U. Vaccaro ๐Ÿ“‚ Article ๐Ÿ“… 1993 ๐Ÿ› Springer ๐ŸŒ English โš– 574 KB

AbstracL A secret sharing scheme permits a secret to be shared among participants in such a way that only qualified subsets of participants can recover the secret, but any nonqualified subset has absolutely no information on the secret. The set of all qualified subsets defines the access structure t