2020
DOI: 10.1016/j.ipl.2020.106018
|View full text |Cite
|
Sign up to set email alerts
|

Strong security of linear ramp secret sharing schemes with general access structures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…Initial scheme Field size π‘ž β€² Design [7] Partially decryptable 2𝐿 Explicit [12] Multiple assignment 𝐿 + π‘š * Optimization [8] Linear π‘ž 𝑂 (𝐿 In a real-world situation, there are many users having different response patterns that reflect their individual requirements, e.g., some user has access to a smaller number of servers than others. We consider a system model, in which there are non-colluding users each of whom has one of 𝑀 response patterns Ξ¦ 1 βŠ‡ β€’ β€’ β€’ βŠ‡ Ξ¦ 𝑀 .…”
Section: Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…Initial scheme Field size π‘ž β€² Design [7] Partially decryptable 2𝐿 Explicit [12] Multiple assignment 𝐿 + π‘š * Optimization [8] Linear π‘ž 𝑂 (𝐿 In a real-world situation, there are many users having different response patterns that reflect their individual requirements, e.g., some user has access to a smaller number of servers than others. We consider a system model, in which there are non-colluding users each of whom has one of 𝑀 response patterns Ξ¦ 1 βŠ‡ β€’ β€’ β€’ βŠ‡ Ξ¦ 𝑀 .…”
Section: Methodsmentioning
confidence: 99%
“…Iwamoto and Yamamoto [7] proposed an explicit method to make a given ramp scheme for a general access structure strongly secure, assuming that the initial scheme satisfies a special property of partial decryptability. Then Eriguchi and Kunihiro [8] gave probabilistic methods assuming that the initial scheme satisfies linearity, which is a more common property of secret sharing. However, their methods are non-constructive and there is no method to verify the resulting scheme is indeed strongly secure except for the brute-force approach, which involves checking exponentially many matrices for non-singularity.…”
Section: Strong Securitymentioning
confidence: 99%
See 3 more Smart Citations