Secret Sharing Schemes for (k, n)-Consecutive Access Structures

被引:2
|
作者
Herranz, Javier [1 ,2 ]
Saez, German [1 ,2 ]
机构
[1] Univ Politecn Cataluna, Dept Matemat, C Jordi Girona 1-3, Barcelona 08034, Spain
[2] CYBERCAT Ctr Cybersecur Res Catalonia, Barcelona, Spain
来源
关键词
Secret sharing schemes; Ideal access structures; Information rate; DECOMPOSITION;
D O I
10.1007/978-3-030-00434-7_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider access structures over a set P of n participants, defined by a parameter k with 1 <= k <= n in the following way: a subset is authorized if it contains participants i, i + 1, ... , i + k - 1, for some i is an element of {1, ... , n - k + 1}. We call such access structures, which may naturally appear in real applications involving distributed cryptography, (k, n)-consecutive. We prove that these access structures are only ideal when k = 1, n - 1, n. Actually, we obtain the same result that has been obtained for other families of access structures: being ideal is equivalent to being a vector space access structure and is equivalent to having an optimal information rate strictly bigger than 2/3. For the non-ideal cases, we give either the exact value of the optimal information rate, for k = n - 2 and k = n - 3, or some bounds on it.
引用
收藏
页码:463 / 480
页数:18
相关论文
共 50 条
  • [31] Secret sharing with access structures in a hierarchy
    Chang, CC
    Lin, CH
    Lee, W
    Hwang, PC
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 31 - 34
  • [32] The Share Size of Secret-Sharing Schemes for Almost All Access Structures and Graphs
    Beimel, Amos
    Farras, Oriol
    THEORY OF CRYPTOGRAPHY, TCC 2020, PT III, 2020, 12552 : 499 - 529
  • [33] The access structure of some secret-sharing schemes
    Renvall, A
    Ding, CS
    INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 67 - 78
  • [34] t-Cheater identifiable (k,n) threshold secret sharing schemes
    Kurosawa, K
    Obana, S
    Ogata, W
    ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 410 - 423
  • [35] Efficient (n, t, n) secret sharing schemes
    Liu, Yan-Xiao
    Harn, Lein
    Yang, Ching-Nung
    Zhang, Yu-Qing
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (06) : 1325 - 1332
  • [36] Improved secret sharing with access structures in a hierarchy
    Liu, Yi
    Zhang, Ling
    Wang, Yumin
    APSCC: 2006 IEEE ASIA-PACIFIC CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2006, : 18 - +
  • [37] Efficient secret sharing with access structures in a hierarchy
    Lin, CH
    Lee, W
    AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 123 - 126
  • [38] Secret sharing on regular bipartite access structures
    Gyarmati, Mate
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (05) : 1951 - 1971
  • [39] Secret sharing on regular bipartite access structures
    Máté Gyarmati
    Designs, Codes and Cryptography, 2023, 91 : 1951 - 1971
  • [40] Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures
    Iwamoto, Mitsugu
    Yamamoto, Hirosuke
    Ogawa, Hirohisa
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 101 - 112