A Skilled Secret Sharing Scheme for r-Uniform Hypergraph-Based Prohibited Structures
نویسنده
چکیده
Secret sharing is that a dealer distributes a piece of information (called a share) about a secret to each participant such that authorized subsets of participants can reconstruct the secret but unauthorized subsets of participants cannot determine the secret. If any unauthorized subset of participants can not obtain any more information regarding the secret, then the scheme is called perfect. A hypergraph is a general graph in which each edge may be formed by more than two vertices. A prohibited structure is a family of the subset of participants such that any subset belongs to this set can not reconstruct the secret. In this paper, we propose a new perfect secret sharing schemes for prohibited structure based on r-uniform hypergraph where a vertex denotes a participant and an edge is a set of participants who cannot recover the secret. The information rate of our schemes is max{r/(C(n 1, r 1) d + r + 1), r/(C(n 1, r 1) d + 1)}, where n is the number of participants and d is the minimum degree of the hypergraph. We will show this scheme is perfect and, makes the scheme of Sun to be a special case. Besides, we also show that this scheme is better than TUM scheme when given a same prohibited structure.
منابع مشابه
A Perfect Secret Sharing Scheme for (r-1, r)-Uniform Hypergraph-Based Access Structures
A secret sharing scheme is a method to distribute a secret among a set of participants, such that only qualified subsets of the participants can recover the secret. A secret sharing scheme is perfect if any unqualified subset obtains no information regarding the master key. The collection of qualified subsets is called access structure. In a hypergraph, if the size of edges is equal to r, the h...
متن کاملAn Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves
In a (t,n)-threshold secret sharing scheme, a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together, but no group of fewer than t participants can do. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao, and the intractability of the elliptic curve discrete logar...
متن کاملOn the design and security of a lattice-based threshold secret sharing scheme
In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...
متن کاملOn the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes
In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...
متن کاملA Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions
A non-interactive (t,n)-publicly veriable secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for<...
متن کامل