Secret Sharing Schemes for (k, n)-Consecutive Access Structures

被引:2
|
作者
Herranz, Javier [1 ,2 ]
Saez, German [1 ,2 ]
机构
[1] Univ Politecn Cataluna, Dept Matemat, C Jordi Girona 1-3, Barcelona 08034, Spain
[2] CYBERCAT Ctr Cybersecur Res Catalonia, Barcelona, Spain
来源
关键词
Secret sharing schemes; Ideal access structures; Information rate; DECOMPOSITION;
D O I
10.1007/978-3-030-00434-7_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider access structures over a set P of n participants, defined by a parameter k with 1 <= k <= n in the following way: a subset is authorized if it contains participants i, i + 1, ... , i + k - 1, for some i is an element of {1, ... , n - k + 1}. We call such access structures, which may naturally appear in real applications involving distributed cryptography, (k, n)-consecutive. We prove that these access structures are only ideal when k = 1, n - 1, n. Actually, we obtain the same result that has been obtained for other families of access structures: being ideal is equivalent to being a vector space access structure and is equivalent to having an optimal information rate strictly bigger than 2/3. For the non-ideal cases, we give either the exact value of the optimal information rate, for k = n - 2 and k = n - 3, or some bounds on it.
引用
收藏
页码:463 / 480
页数:18
相关论文
共 50 条
  • [41] IDEAL SECRET SHARING SCHEMES ON GRAPH-BASED 3-HOMOGENEOUS ACCESS STRUCTURES
    Janbaz, Shahrooz
    Zaghian, Ali
    Bagherpour, Bagher
    TRANSACTIONS ON COMBINATORICS, 2021, 10 (02) : 107 - 120
  • [42] Contrast-optimal k out of n secret sharing schemes in visual cryptography
    Hofmeister, T
    Krause, M
    Simon, HU
    THEORETICAL COMPUTER SCIENCE, 2000, 240 (02) : 471 - 485
  • [43] Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters
    Pramanik, Jyotirmoy
    Roy, Partha Sarathi
    Dutta, Sabyasachi
    Adhikari, Avishek
    Sakurai, Kouichi
    INFORMATION SYSTEMS SECURITY, ICISS 2018, 2018, 11281 : 171 - 188
  • [44] Secret sharing schemes with detection of cheaters for a general access structure
    Cabello, S
    Padró, C
    Sáez, G
    FUNDAMENTALS OF COMPUTATION THEORY, 1999, 1684 : 185 - 194
  • [45] Secret sharing schemes with detection of cheaters for a general access structure
    Cabello, S
    Padró, C
    Sáez, G
    DESIGNS CODES AND CRYPTOGRAPHY, 2002, 25 (02) : 175 - 188
  • [46] Dynamic access policies for unconditionally secure secret sharing schemes
    Martin, KM
    2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005, : 61 - 66
  • [47] Secret Sharing Schemes with Detection of Cheaters for a General Access Structure
    Sergio Cabello
    Carles Padró
    Germán Sáez
    Designs, Codes and Cryptography, 2002, 25 : 175 - 188
  • [48] A note on secret sharing schemes with three homogeneous access structure
    Marti-Farre, Jaume
    INFORMATION PROCESSING LETTERS, 2007, 102 (04) : 133 - 137
  • [49] On secret sharing schemes
    Blundo, C
    De Santis, A
    Vaccaro, U
    INFORMATION PROCESSING LETTERS, 1998, 65 (01) : 25 - 32
  • [50] Asymptotically ideal Chinese remainder theorem -based secret sharing schemes for multilevel and compartmented access structures
    Tiplea, Ferucio Laurentiu
    Dragan, Constantin Catalin
    IET INFORMATION SECURITY, 2021, 15 (04) : 282 - 296