Ways to merge two secret sharing schemes

被引:2
|
作者
Slinko, Arkadii [1 ]
机构
[1] Univ Auckland, Dept Math, Auckland, New Zealand
关键词
matrix algebra; cryptographic protocols; ideal linear secret sharing schemes; secret sharing scheme; linear access structures;
D O I
10.1049/iet-ifs.2019.0210
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A secret sharing scheme implemented in an organisation is designed to reflect the power structure in that organisation. When two organisations merge, this usually requires a number of substantial changes and, in particular, changes to their secret sharing schemes which have to be merged in the way which reflects a new role of each of the organisations. This study looks at the ways secret sharing scheme can be modified when organisational changes occur. The authors restrict themselves with the class of ideal linear secret sharing schemes and describe how matrices of these linear schemes have to be modified when they take the sum, the product or the composition of two linear access structures.
引用
收藏
页码:146 / 150
页数:5
相关论文
共 50 条
  • [1] Two Optimum Secret Sharing Schemes Revisited
    Cao, Zhengjun
    Markowitch, Olivier
    2008 INTERNATIONAL SEMINAR ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, PROCEEDINGS, 2008, : 157 - +
  • [2] On secret sharing schemes
    Blundo, C
    De Santis, A
    Vaccaro, U
    INFORMATION PROCESSING LETTERS, 1998, 65 (01) : 25 - 32
  • [3] Two Quantum Secret Sharing Schemes with Adversary Structure
    Wu, Tingting
    Zhu, Shixin
    Li, Fulin
    Liu, Li
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2022, 61 (07)
  • [4] Notes on two multiparty quantum secret sharing schemes
    Gao, Gan
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2018, 16 (03)
  • [5] Two secret sharing schemes based on Boolean operations
    Wang, Daoshun
    Zhang, Lei
    Ma, Ning
    Li, Xiaobo
    PATTERN RECOGNITION, 2007, 40 (10) : 2776 - 2785
  • [6] Two Quantum Secret Sharing Schemes with Adversary Structure
    Tingting Wu
    Shixin Zhu
    Fulin Li
    Li Liu
    International Journal of Theoretical Physics, 61
  • [7] On secret reconstruction in secret sharing schemes
    Wang, Huaxiong
    Wong, Duncan S.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (01) : 473 - 480
  • [8] On identification secret sharing schemes
    Cai, N
    Lam, KY
    INFORMATION AND COMPUTATION, 2003, 184 (02) : 298 - 310
  • [9] On Proactive Secret Sharing Schemes
    Nikov, V
    Nikova, S
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 308 - 325
  • [10] Secret sharing schemes on graphs
    Csirmaz, Laszlo
    STUDIA SCIENTIARUM MATHEMATICARUM HUNGARICA, 2007, 44 (03) : 297 - 306