2006
DOI: 10.1016/j.ipl.2005.09.012
|View full text |Cite
|
Sign up to set email alerts
|

Strongly secure ramp secret sharing schemes for general access structures

Abstract: Ramp secret sharing (SS) schemes can be classified into strong ramp SS schemes and weak ramp SS schemes. The strong ramp SS schemes do not leak out any part of a secret explicitly even in the case where some information about the secret leaks from a non-qualified set of shares, and hence, they are more desirable than weak ramp SS schemes. However, it is not known how to construct the strong ramp SS schemes in the case of general access structures. In this paper, it is shown that a strong ramp SS scheme can alw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
41
0
1

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 35 publications
(42 citation statements)
references
References 12 publications
0
41
0
1
Order By: Relevance
“…Eventually, in (t, L, n) threshold ramp SSSs (RSSSs) introduced by Blackley [13], the secret cannot be reconstructed from t − L or less shares (vs. t − 1 or less in above SSSs), with 1 ≤ ≤ L−1 shares being allowed to leak information about the secret. Thus, RSSSs propose a tradeoff between security and efficiency (measured by entropy) [55]. Let H(d) and H(e i ) i=1,··· ,n be the entropy of the secret and its shares, respectively.…”
Section: Group 1: Classical Secret Sharing Schemesmentioning
confidence: 99%
See 2 more Smart Citations
“…Eventually, in (t, L, n) threshold ramp SSSs (RSSSs) introduced by Blackley [13], the secret cannot be reconstructed from t − L or less shares (vs. t − 1 or less in above SSSs), with 1 ≤ ≤ L−1 shares being allowed to leak information about the secret. Thus, RSSSs propose a tradeoff between security and efficiency (measured by entropy) [55]. Let H(d) and H(e i ) i=1,··· ,n be the entropy of the secret and its shares, respectively.…”
Section: Group 1: Classical Secret Sharing Schemesmentioning
confidence: 99%
“…Let H(d) and H(e i ) i=1,··· ,n be the entropy of the secret and its shares, respectively. In SSSs, H(e i ) ≥ H(d), while in RSSSs, H(e i ) = H(d) ÷ L. [55] also introduces the notion of strong and weak RSSSs, and shows that Shamir-based SSSs may be weak. Yet, most of the following RSSSs still extend Shamir's SSS.…”
Section: Group 1: Classical Secret Sharing Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…However, we can modify the proposed scheme to strongly secure one that avoids such flaw of weakly secure schemes along with the technique proposed in [10]. Namely, the strongly secure CSCs can be obtained by applying Hilbert matrix to a vector of sub-keys to construct new sub-keys, the detail of which is omitted due to the space limitation.…”
Section: Key Construction Algorithmmentioning
confidence: 99%
“…ramp SS, a share set is said to be forbidden if it has no information about secret, while it is said to be intermediate if it is neither qualified nor forbidden [5,14].…”
mentioning
confidence: 99%