Abstract
A nonperfect secret sharing scheme (NSS) consists of a family of access subsets Γ 1, a family of semi-access subsets Γ 2 and a family of non-access subsets Γ 3. In an NSS, it is possible that ¦V i¦<¦S¦, where ¦V i¦ is the size of the share and ¦S¦ is the size of the secret. This paper characterizes nonperfect secret sharing schemes. First, we show that (Γ 1, Γ 2, Γ 3) is realizable if and only if Γ 1 is monotone and Γ 1 ∪ Γ 2 is monotone. Then, we derive a lower bound of ¦V i¦ in terms of a distance between Γ 1 and Γ 3. Finally, we show a condition for (Γ 1, Γ 2, Γ 3) to achieve ¦V i ¦=¦S¦/2 for all i.
Preview
Unable to display preview. Download preview PDF.
References
Blakley, G.R.: Safeguarding cryptographic keys. Proc. of the AFIPS 1979 National Computer Conference 48 (1979) 313–317
Shamir, A.: How to share a secret. Communications of the ACM 22 (1979) 612–613
Itoh, M., Saito, A., Nishizeki, T.: Secret sharing scheme realizing general access structure. Proc. of IEEE Globecom '87 Tokyo (1987) 99–102
Benaloh, J.C., Leichter, J.: Generalized secret sharing and monotone functions. Crypto'88 (1990) 27–36
Brickell, E.F., Davenport, D.M.: On the classification of ideal secret sharing schemes. Journal of Cryptology 4 (1991) 123–134
Capocelli, R.M., De Santis, A., Gargano, L., Vaccaro, U.: On the size of shares for secret sharing schemes. Crypto'91 (1991) 101–113
Karnin, E.D., Green, J.W., Hellman, M.E.: On secret sharing systems. IEEE Trans. IT-29 (1982) 35–41
Brickell, E.F., Stinson, D.R.: Some improved bounds on the information rate of perfect secret sharing schemes. Crypto'90 (1990) 242–252
Blund, C., De Santis, A., Stinson, D.R., Vaccaro, V.: Graph decomposition and secret sharing schemes. Eurocrypt'92 (1992) 1–20
Blund, C., De Santis, A., Gargano, L., Vaccaro, U.: On the information rate of secret sharing schemes. Crypto'92 (1992)
Stinson, D.R.: New general bounds on the information rate of secret sharing schemes. Crypto'92 (1992)
Blakeley, G.R., Meadows, C.: Security of ramp schemes. Crypto'84 242–268 (1984)
Berge, C.: Graphs and Hypergraphs. North Holland (1973)
Welsh, D.J.A.: Matroid Theory. Academic Press (1976)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1993 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ogata, W., Kurosawa, K., Tsujii, S. (1993). Nonperfect secret sharing schemes. In: Seberry, J., Zheng, Y. (eds) Advances in Cryptology — AUSCRYPT '92. AUSCRYPT 1992. Lecture Notes in Computer Science, vol 718. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57220-1_52
Download citation
DOI: https://doi.org/10.1007/3-540-57220-1_52
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-57220-6
Online ISBN: 978-3-540-47976-5
eBook Packages: Springer Book Archive