Skip to main content

Nonperfect secret sharing schemes

  • Conference paper
  • First Online:
Book cover Advances in Cryptology — AUSCRYPT '92 (AUSCRYPT 1992)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 718))

Abstract

A nonperfect secret sharing scheme (NSS) consists of a family of access subsets Γ 1, a family of semi-access subsets Γ 2 and a family of non-access subsets Γ 3. In an NSS, it is possible that ¦V i¦<¦S¦, where ¦V i¦ is the size of the share and ¦S¦ is the size of the secret. This paper characterizes nonperfect secret sharing schemes. First, we show that (Γ 1, Γ 2, Γ 3) is realizable if and only if Γ 1 is monotone and Γ 1Γ 2 is monotone. Then, we derive a lower bound of ¦V i¦ in terms of a distance between Γ 1 and Γ 3. Finally, we show a condition for (Γ 1, Γ 2, Γ 3) to achieve ¦V i ¦=¦S¦/2 for all i.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blakley, G.R.: Safeguarding cryptographic keys. Proc. of the AFIPS 1979 National Computer Conference 48 (1979) 313–317

    Google Scholar 

  2. Shamir, A.: How to share a secret. Communications of the ACM 22 (1979) 612–613

    Google Scholar 

  3. Itoh, M., Saito, A., Nishizeki, T.: Secret sharing scheme realizing general access structure. Proc. of IEEE Globecom '87 Tokyo (1987) 99–102

    Google Scholar 

  4. Benaloh, J.C., Leichter, J.: Generalized secret sharing and monotone functions. Crypto'88 (1990) 27–36

    Google Scholar 

  5. Brickell, E.F., Davenport, D.M.: On the classification of ideal secret sharing schemes. Journal of Cryptology 4 (1991) 123–134

    Google Scholar 

  6. Capocelli, R.M., De Santis, A., Gargano, L., Vaccaro, U.: On the size of shares for secret sharing schemes. Crypto'91 (1991) 101–113

    Google Scholar 

  7. Karnin, E.D., Green, J.W., Hellman, M.E.: On secret sharing systems. IEEE Trans. IT-29 (1982) 35–41

    Google Scholar 

  8. Brickell, E.F., Stinson, D.R.: Some improved bounds on the information rate of perfect secret sharing schemes. Crypto'90 (1990) 242–252

    Google Scholar 

  9. Blund, C., De Santis, A., Stinson, D.R., Vaccaro, V.: Graph decomposition and secret sharing schemes. Eurocrypt'92 (1992) 1–20

    Google Scholar 

  10. Blund, C., De Santis, A., Gargano, L., Vaccaro, U.: On the information rate of secret sharing schemes. Crypto'92 (1992)

    Google Scholar 

  11. Stinson, D.R.: New general bounds on the information rate of secret sharing schemes. Crypto'92 (1992)

    Google Scholar 

  12. Blakeley, G.R., Meadows, C.: Security of ramp schemes. Crypto'84 242–268 (1984)

    Google Scholar 

  13. Berge, C.: Graphs and Hypergraphs. North Holland (1973)

    Google Scholar 

  14. Welsh, D.J.A.: Matroid Theory. Academic Press (1976)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jennifer Seberry Yuliang Zheng

Rights and permissions

Reprints and permissions

Copyright information

© 1993 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ogata, W., Kurosawa, K., Tsujii, S. (1993). Nonperfect secret sharing schemes. In: Seberry, J., Zheng, Y. (eds) Advances in Cryptology — AUSCRYPT '92. AUSCRYPT 1992. Lecture Notes in Computer Science, vol 718. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57220-1_52

Download citation

  • DOI: https://doi.org/10.1007/3-540-57220-1_52

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-57220-6

  • Online ISBN: 978-3-540-47976-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics