“…(3) is a [8,2,6] code over F 7 with the weight enumerator 1 + 24x 6 + 24x 8 . We can then obtain nonzero codewords of C(r, 6) in this example through programming, as follows : When N 1 = 3 or N 1 = 4, the weight enumerator of some irreducible cyclic codes C(r, N ) were studied [24,26].…”
Section: A N U S C R I P Tmentioning
confidence: 99%
“…An ideal secret sharing scheme is well-known to be the best efficiency that one can achieve with lowest storage complexity and the communication complexity [5,6]. We say that Γ ⊂ 2 P is an ideal access structure if there exists an ideal secret sharing scheme for Γ.…”
Coding theory is one of ways to construct ideal access structures. However, in general, determining the ideal access structures of the secret sharing schemes based on linear codes is very hard. According to the concept of minimal liner codes we proposed, this paper concentrate on irreducible cyclic codes and construct the ideal access structures of the schemes based on the duals of minimal irreducible cyclic codes. In order to study the conditions whether several types of irreducible cyclic codes are minimal, we investigate the weight enumerators of certain irreducible cyclic codes by means of cyclotomic classes and Gaussian periods. On the basis of our aforementioned studies, we obtain ideal access structures and show the corresponding examples through programming.
“…(3) is a [8,2,6] code over F 7 with the weight enumerator 1 + 24x 6 + 24x 8 . We can then obtain nonzero codewords of C(r, 6) in this example through programming, as follows : When N 1 = 3 or N 1 = 4, the weight enumerator of some irreducible cyclic codes C(r, N ) were studied [24,26].…”
Section: A N U S C R I P Tmentioning
confidence: 99%
“…An ideal secret sharing scheme is well-known to be the best efficiency that one can achieve with lowest storage complexity and the communication complexity [5,6]. We say that Γ ⊂ 2 P is an ideal access structure if there exists an ideal secret sharing scheme for Γ.…”
Coding theory is one of ways to construct ideal access structures. However, in general, determining the ideal access structures of the secret sharing schemes based on linear codes is very hard. According to the concept of minimal liner codes we proposed, this paper concentrate on irreducible cyclic codes and construct the ideal access structures of the schemes based on the duals of minimal irreducible cyclic codes. In order to study the conditions whether several types of irreducible cyclic codes are minimal, we investigate the weight enumerators of certain irreducible cyclic codes by means of cyclotomic classes and Gaussian periods. On the basis of our aforementioned studies, we obtain ideal access structures and show the corresponding examples through programming.
“…In the most of these approaches, many researchers have proposed different constructions of a perfect secret sharing scheme based on uniform access structures which contains qualified subsets all of the same cardinality m. In these constructions, participants are represented by the vertices of a graph G, the uniform access structure Γ is based on the concept of adjacent vertices and represented by the edges, for more details see for instance [4,18,3,14,6,13]. In [2] a novel approach to design a graph access structure, which is based on the concept of non-adjacent vertices, was proposed. In this approach, an independent dominating set of vertices in a graph G was introduced and applied as a novel idea to construct a perfect secret sharing scheme such that the vertices of the graph represent the participants and the dominating set of vertices in G represents the minimal qualified set.…”
One of the methods used in order to protect a secret K is a secret sharing scheme. In this scheme the secret K is distributed among a finite set of participants P by a special participant called the dealer, in such a way that only predefined subsets of participants can recover the secret after collaborating with their secret shares. The construction of secret sharing schemes has received a considerable attention of many searchers whose main goal was to improve the information rate. In this paper, we propose a novel construction of a secret sharing scheme which is based on the hierarchical concept of companies illustrated through its organization chart and represented by a tree. We proof that the proposed scheme is ideal by showing that the information rate equals 1. In order to show the efficiency of the proposed scheme, we discuss all possible kinds of attacks and proof that the security in ensured. Finally, we include a detailed didactic example for a small company organization chart.
“…In Perfect secret sharing scheme based on vertex domination set [4], the authors present a method for protecting secret data. They introduce the novel idea of constructing a secretsharing scheme using a graph G whose vertices represent the participants and the dominating set of vertices in G represents the minimal authorized set.…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.