New Secret Sharing Schemes Realizing General Access Structures
نویسندگان
چکیده
منابع مشابه
On Multiplicative Secret Sharing Schemes Realizing Graph Access Structures
In this paper we consider graph access structures and we show that such an access structure can be realized by a (strongly) multiplicative monotone span program if and only if the privacy structure contains at least three (resp. four) maximal sets. Thus, we obtain a new family of access structures with an explicit construction that is both ideal and strongly multiplicative. Until now only three...
متن کاملSecret Sharing Schemes with General Access Structures (Full version)
Secret sharing schemes with general monotone access structures have been widely discussed in the literature. But in some scenarios, non-monotone access structures may have more practical significance. In this paper, we shed a new light on secret sharing schemes realizing general (not necessarily monotone) access structures. Based on an attack model for secret sharing schemes with general access...
متن کاملStrongly secure ramp secret sharing schemes for general access structures
Ramp secret sharing (SS) schemes can be classified into strong ramp SS schemes and weak ramp SS schemes. The strong ramp SS schemes do not leak out any part of a secret explicitly even in the case that some information about the secret leaks out from some set of shares, and hence, they are more desirable than the weak ramp SS schemes. In this paper, it is shown that for any feasible general acc...
متن کاملSecret sharing schemes for Multipartite access structures
Information security has become much more important since electronic communication is started to be used in our daily life. The content of the term information security varies according to the type and the requirements of the area. Secret sharing schemes are introduced to solve the problems for securing sensitive information. In this paper, we review our proposed hierarchical and compartmented ...
متن کاملVerifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. In 2005, Shao and Cao developed a verifiable multi-secret sharing scheme where each participant’s share can be used several times which reduces the number of interactions between the dealer and the group members. In addition, some secrets may require a higher security level than others involving t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Processing
سال: 2015
ISSN: 1882-6652
DOI: 10.2197/ipsjjip.23.570