Secret Sharing Schemes for (k, n)-Consecutive Access Structures

被引:2
|
作者
Herranz, Javier [1 ,2 ]
Saez, German [1 ,2 ]
机构
[1] Univ Politecn Cataluna, Dept Matemat, C Jordi Girona 1-3, Barcelona 08034, Spain
[2] CYBERCAT Ctr Cybersecur Res Catalonia, Barcelona, Spain
来源
关键词
Secret sharing schemes; Ideal access structures; Information rate; DECOMPOSITION;
D O I
10.1007/978-3-030-00434-7_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider access structures over a set P of n participants, defined by a parameter k with 1 <= k <= n in the following way: a subset is authorized if it contains participants i, i + 1, ... , i + k - 1, for some i is an element of {1, ... , n - k + 1}. We call such access structures, which may naturally appear in real applications involving distributed cryptography, (k, n)-consecutive. We prove that these access structures are only ideal when k = 1, n - 1, n. Actually, we obtain the same result that has been obtained for other families of access structures: being ideal is equivalent to being a vector space access structure and is equivalent to having an optimal information rate strictly bigger than 2/3. For the non-ideal cases, we give either the exact value of the optimal information rate, for k = n - 2 and k = n - 3, or some bounds on it.
引用
收藏
页码:463 / 480
页数:18
相关论文
共 50 条
  • [21] Perfect secret sharing schemes for graph access structures on six participants
    Gharahi, Motahhareh
    Dehkordi, Massoud Hadian
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2013, 7 (02) : 143 - 146
  • [22] Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
    Beimel, Amos
    Farras, Oriol
    Mintz, Yuval
    Peter, Naty
    THEORY OF CRYPTOGRAPHY, TCC 2017, PT II, 2017, 10678 : 394 - 423
  • [23] Optimal linear secret sharing schemes for graph access structures on six participants
    Gharahi, Motahhareh
    Khazaei, Shahram
    THEORETICAL COMPUTER SCIENCE, 2019, 771 : 1 - 8
  • [24] Verifiable multi-secret sharing schemes for multiple threshold access structures
    Tartary, Christophe
    Pieprzyk, Josef
    Wang, Huaxiong
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 167 - +
  • [25] Strong security of linear ramp secret sharing schemes with general access structures
    Eriguchi, Reo
    Kunihiro, Noboru
    INFORMATION PROCESSING LETTERS, 2020, 164
  • [26] DECOMPOSITION CONSTRUCTION FOR SECRET SHARING SCHEMES WITH GRAPH ACCESS STRUCTURES IN POLYNOMIAL TIME
    Sun, Hung-Min
    Wang, Huaxiong
    Ku, Bying-He
    Pieprzyk, Josef
    SIAM JOURNAL ON DISCRETE MATHEMATICS, 2010, 24 (02) : 617 - 638
  • [27] Secret sharing schemes with bipartite access structure
    Padrö, Carles
    Sâez, German
    2000, IEEE, Piscataway, NJ, United States (46)
  • [28] Secret sharing schemes with bipartite access structure
    Padró, C
    Sáez, G
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 500 - 511
  • [29] Secret sharing schemes with bipartite access structure
    Padró, C
    Sáez, G
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (07) : 2596 - 2604
  • [30] Constructions and Properties of k out of n Visual Secret Sharing Schemes
    Verheul E.R.
    Van Tilborg H.C.A.
    Designs, Codes and Cryptography, 1997, 11 (2) : 179 - 196