Lecture Notes in Computer Science
DOI: 10.1007/3-540-46885-4_45
|View full text |Cite
|
Sign up to set email alerts
|

Some Ideal Secret Sharing Schemes

Abstract: In a secret sharing scheme, a dealer has a secret. The dealer gives each participant in the scheme a share of the secret. There is a set I? of subsets of the participants with the property that any subset of participants that is in I? can determine the secret.En a perfect secret sharing scheme, any subset of participants that is not in I' cannot obtain any information about the secret. We wilI say that a perfect secret sharing scheme is ideal if all of the shares are from the same domain as the secret. Shamir … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

4
326
0
4

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 273 publications
(334 citation statements)
references
References 4 publications
4
326
0
4
Order By: Relevance
“…Thus, even using multi-linear schemes one cannot construct efficient schemes for general access structures. We will use the following alternative definition of multi-linear secret sharing schemes, proven to be equivalent in [13] (following [7,20]). Note that not every labeled matrix is a multi-target span program.…”
Section: Lower Bounds For Multi-linear Secret-sharing Schemesmentioning
confidence: 99%
See 2 more Smart Citations
“…Thus, even using multi-linear schemes one cannot construct efficient schemes for general access structures. We will use the following alternative definition of multi-linear secret sharing schemes, proven to be equivalent in [13] (following [7,20]). Note that not every labeled matrix is a multi-target span program.…”
Section: Lower Bounds For Multi-linear Secret-sharing Schemesmentioning
confidence: 99%
“…Better constructions were introduced by Benaloh and Leichter [3]. Linear secret-sharing schemes were presented by Brickel [7] for the case that each share is one field element and by Krachmer and Wigderson [20] for the case that each share can contain more than one field element. Karchmer and Wigderson's motivation was studying a complexity model called span programs; in particular, they proved that monotone span programs are equivalent to linear secret-sharing schemes.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Brickell and Davenport [13] discovered strong connections of this open problem with matroid theory. Specifically, every ideal secret sharing scheme defines a unique matroid, and hence ideal secret sharing schemes can be seen as representations of matroids that actually include linear representations because of the construction of ideal linear schemes proposed by Brickell [12].…”
Section: Introductionmentioning
confidence: 99%
“…Both disjunctive and conjunctive hierarchical access structures have been proved to be ideal (Brickell, 1990;Tassa, 2007) which means they can carry the most informationally efficient secret sharing scheme and be completely secure (i.e., not giving any information about the secret to unauthorized coalitions). Classification of ideal access structures proved to be extremely difficult problem and the focus of attention has moved to classification of ideal access structures in subclasses of access structures like weighted threshold access structures introduced by Shamir (1979).…”
Section: Introductionmentioning
confidence: 99%