Some Basic Properties of General Nonperfect Secret Sharing Schemes

نویسندگان

  • Wakaha Ogata
  • Kaoru Kurosawa
چکیده

Nonperfect secret sharing schemes (NSSs) have an advantage such that the size of shares can be shorter than that of perfect secret sharing schemes. This paper shows some basic properties of general NSS. First, we present a necessary and su cient condition on the existence of an NSS. Next, we show two bounds of the size of shares, a combinatorial type bound and an entropy type bound. Further, we de ne a compact NSS as an NSS which meets the equalities of both our bounds. Then we show that a compact NSS has some special access hierarchy and it is closely related to a matroid. Veri able nonperfect secret sharing schemes are also presented.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Nonperfect Secret Sharing Schemes and Matroids

This paper shows that nonperfect secret sharing schemes (NSS) have matroid structures and presents a direct link between the secret sharing matroids and entropy for both perfect and nonperfect schemes. We deene natural classes of NSS and derive a lower bound of jVij for those classes. \Ideal" nonperfect schemes are deened based on this lower bound. We prove that every such ideal secret sharing ...

متن کامل

Some New Results on Nonperfect Secret Sharing Schemes

In secret sharing schemes, jV i j should be as small as possible, where V i denotes the set of share of player P i. It is known that the scheme must be nonperfect if jV i j < jSj, where S denotes the set of s. A secret sharing scheme is called nonperfect if there exists a subset of players who have some information on the sectret s but cannot recover s. For nonperfect secret sharing schemes, th...

متن کامل

Lower Bound on the Size of Shares of Nonperfect Secret Sharing Schemes

In a secret sharing scheme (SS), a dealer D distributes a piece of information Vi of a secret S to each participant Pi. If we desire that jVij < jSj, a nonperfct SS must be used, in which there exists a semi-access set C that has some information on S, but cannot recover S. This paper rst presents a general lower bound on jVij which includes the previous lower bounds for perfect SSs and nonperf...

متن کامل

Security Analysis of a Hash-Based Secret Sharing Scheme

Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. UCS

دوره 4  شماره 

صفحات  -

تاریخ انتشار 1998