Abstract
We consider access structures over a set \(\mathcal {P}\) of n participants, defined by a parameter k with \(1 \le k \le n\) in the following way: a subset is authorized if it contains participants \(i,i+1,\ldots ,i+k-1\), for some \(i \in \{1,\ldots ,n-k+1\}\). We call such access structures, which may naturally appear in real applications involving distributed cryptography, (k, n)-consecutive.
We prove that these access structures are only ideal when \(k=1,n-1,n\). Actually, we obtain the same result that has been obtained for other families of access structures: being ideal is equivalent to being a vector space access structure and is equivalent to having an optimal information rate strictly bigger than \(\frac{2}{3}\). For the non-ideal cases, we give either the exact value of the optimal information rate, for \(k=n-2\) and \(k=n-3\), or some bounds on it.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Beimel, A., Tassa, T., Weinreb, E.: Characterizing ideal weighted threshold secret sharing. SIAM J. Discret. Math. 22(1), 360–397 (2008)
Blakley, G.R.: Safeguarding cryptographic keys. In: AFIPS Conference Proceedings, vol. 48, pp. 313–317 (1979)
Blundo, C., De Santis, A., De Simone, R., Vaccaro, U.: Tight bounds on the information rate of secret sharing schemes. Des. Codes Cryptogr. 11(2), 107–122 (1997)
Blundo, C., De Santis, A., Stinson, D.R., Vaccaro, U.: Graph decompositions and secret sharing schemes. J. Cryptol. 8(1), 39–64 (1995)
Brickell, E.F., Davenport, D.M.: On the classification of ideal secret sharing schemes. J. Cryptol. 4, 123–134 (1991)
Csirmaz, L., Tardos, G.: Optimal information rate of secret sharing schemes on trees. IEEE Trans. Inf. Theory 59(4), 2527–2530 (2013)
Di Crescenzo, G., Galdi, C.: Hypergraph decomposition and secret sharing. Discret. Appl. Math. 157(5), 928–946 (2009)
Farràs, O., Kaced, T., Martín, S., Padró, C.: Improving the linear programming technique in the search for lower bounds in secret sharing. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10820, pp. 597–621. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78381-9_22
Farràs, O., Martí-Farré, J., Padró, C.: Ideal multipartite secret sharing schemes. J. Cryptol. 25(3), 434–463 (2012)
Farràs, O., Padró, C.: Ideal hierarchical secret sharing schemes. IEEE Trans. Inf. Theory 58(5), 3273–3286 (2012)
Herranz, J., Sáez, G.: New results on multipartite access structures. IET Proc. Inf. Secur. 153(4), 153–162 (2006)
Jackson, W.A., Martin, K.M.: Geometric secret sharing schemes and their duals. Des. Codes Cryptogr. 4(1), 83–95 (1994)
Jackson, W.A., Martin, K.M.: Perfect secret sharing schemes on five participants. Des. Codes Cryptogr. 9(3), 267–286 (1996)
Juels, A., Pappu, R., Parno, B.: Unidirectional key distribution across time and space with applications to RFID security. In: Proceedings of the USENIX Security Symposium 2008, pp. 75–90 (2008)
Martí-Farré, J., Padró, C.: Secret sharing schemes on sparse homogeneous access structures with rank three. Electron. J. Comb. 11(1), 72 (2004)
Martí-Farré, J., Padró, C.: Secret sharing schemes with three or four minimal qualified subsets. Des. Codes Cryptogr. 34(1), 17–34 (2005)
Martí-Farré, J., Padró, C.: Secret sharing schemes on access structures with intersection number equal to one. Discret. Appl. Math. 154(3), 552–563 (2006)
Martín, A., Pereira, J., Rodríguez, G.: A secret sharing scheme based on cellular automata. Appl. Math. Comput. 170(2), 1356–1364 (2005)
Padró, C., Sáez, G.: Secret sharing schemes with bipartite access structure. IEEE Trans. Inf. Theory 46(7), 2596–2604 (2000)
Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)
Stinson, D.R.: Decomposition constructions for secret sharing schemes. IEEE Trans. Inf. Theory 40(1), 118–125 (1994)
Tassa, T.: Hierarchical threshold secret sharing. J. Cryptol. 20(2), 237–264 (2007)
Acknowledgments
This work is partially supported by Spanish Ministry of Economy and Competitiveness, under Project MTM2016-77213-R.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Herranz, J., Sáez, G. (2018). Secret Sharing Schemes for (k, n)-Consecutive Access Structures. In: Camenisch, J., Papadimitratos, P. (eds) Cryptology and Network Security. CANS 2018. Lecture Notes in Computer Science(), vol 11124. Springer, Cham. https://doi.org/10.1007/978-3-030-00434-7_23
Download citation
DOI: https://doi.org/10.1007/978-3-030-00434-7_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00433-0
Online ISBN: 978-3-030-00434-7
eBook Packages: Computer ScienceComputer Science (R0)