Secret sharing schemes for Multipartite access structures
نویسندگان
چکیده
Information security has become much more important since electronic communication is started to be used in our daily life. The content of the term information security varies according to the type and the requirements of the area. Secret sharing schemes are introduced to solve the problems for securing sensitive information. In this paper, we review our proposed hierarchical and compartmented secret sharing schemes. Later ideal and perfect disjunctive hierarchical secret sharing scheme, constructed based on the Maximum Distance Separable (MDS) codes, is proposed in this paper. The scheme is ideal as well as perfect. Also, size of the ground field for the proposed scheme is independent of the parameters of the access structure. Further, it is efficient and require O(n), where n is the number of participants.
منابع مشابه
Ideal secret sharing schemes with multipartite access structures
The concept of quasi-threshold multipartite access structures for secret sharing schemes is introduced. These access structures allow one distinguished class of participants to retain control over the reconstruction of the secret, while allowing flexibility over the quorum of participants from other classes. While ideal bipartite access structures have been classified, the case for multipartite...
متن کاملMultipartite Secret Sharing Based on CRT
Secure communication has become more and more important for system security. Since avoiding the use of encryption one by one can introduce less computation complexity, secret sharing scheme (SSS) has been used to design many security protocols. In SSSs, several authors have studied multipartite access structures, in which the set of participants is divided into several parts and all participant...
متن کاملIdeal Secret Sharing Schemes for Useful Multipartite Access Structures
This paper is a survey of the main results and open problems in a line of work that was initiated shortly after secret sharing was introduced. Namely, the construction of ideal linear secret sharing schemes for access structures that are natural generalizations of the threshold ones and have interesting properties for the applications. Some of them have hierarchical properties, while other ones...
متن کاملNew Results on Ideal Multipartite Secret Sharing and its Applications to Group Communications
With the rapid development of various group-oriented services, multipartite group communications occur frequently in a single network, where a multipartite access structure is defined to be a collection of the subsets of users who may come from different parts of the network such that only users in an authorized subset of users can use their shares to build up a group key for a secure group com...
متن کاملAnonymous Secret Sharing Schemes
In this paper we study anonymous secret sharing schemes. Informally, in an anonymous secret sharing scheme the secret can be reconstructed without knowledge of which participants hold which shares. In such schemes the computation of the secret can be carried out by giving the shares to a black box that does not know the identities of the participants holding those shares. Phillips and Phillips ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016