Combinatorial Lower Bounds for Secret Sharing Schemes

نویسندگان

  • Kaoru Kurosawa
  • Koji Okada
چکیده

In a perfect secret sharing scheme, it holds that log 2 j ^ V i j H(S), where S denotes the secret and ^ V i denotes the set of the share of user i. On the other hand, it is well known that log 2 j ^ Sj > H(S) if S is not uniformly distributed, where ^ S denotes the set of secrets. In this case, log 2 j ^ V i j H(S) < log 2 j ^ Sj : Then, which is bigger, j ^ V i j or j ^ Sj ? We rst prove that j ^ V i j j ^ Sj for any distribution on S by using a combinatorial argument. This is a more sharp lower bound on j ^ V i j for not uniformly distributed S. Our proof makes it intuitively clear why j ^ V i j must be so large. Next, we extend our technique to show that max i log 2 j ^ V i j 1:5 log 2 j ^ Sj for some access structure.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming

Optimizing the maximum, or average, length of the shares in relation to the length of the secret for every given access structure is a difficult and long-standing open problem in cryptology. Most of the known lower bounds on these parameters have been obtained by implicitly or explicitly using that every secret sharing scheme defines a polymatroid related to the access structure. The best bound...

متن کامل

On the Dealer's Randomness Required in Secret Sharing Schemes

In this paper we provide upper and lower bounds on the randomness required by the dealer to set up a secret sharing scheme for innnite classes of access structures. Lower bounds are obtained using entropy arguments. Upper bounds derive from a decomposition construction based on combinatorial designs (in particular, t-(v; k;) designs). We prove a general result on the randomness needed to constr...

متن کامل

On the Optimization of Bipartite Secret Sharing Schemes

Optimizing the ratio between the maximum length of the shares and the length of the secret value in secret sharing schemes for general access structures is an extremely difficult and long-standing open problem. In this paper, we study it for bipartite access structures, in which the set of participants is divided in two parts, and all participants in each part play an equivalent role. We focus ...

متن کامل

Secret-Sharing Schemes: A Survey

A secret-sharing scheme is a method by which a dealer distributes shares to parties such that only authorized subsets of parties can reconstruct the secret. Secret-sharing schemes are important tools in cryptography and they are used as a building box in many secure protocols, e.g., general protocol for multiparty computation, Byzantine agreement, threshold cryptography, access control, attribu...

متن کامل

Security Analysis of a Hash-Based Secret Sharing Scheme

Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...

متن کامل

Some Basic Properties of General Nonperfect Secret Sharing Schemes

Nonperfect secret sharing schemes (NSSs) have an advantage such that the size of shares can be shorter than that of perfect secret sharing schemes. This paper shows some basic properties of general NSS. First, we present a necessary and su cient condition on the existence of an NSS. Next, we show two bounds of the size of shares, a combinatorial type bound and an entropy type bound. Further, we...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Inf. Process. Lett.

دوره 60  شماره 

صفحات  -

تاریخ انتشار 1996