Skip to main content
Log in

On the information rate of perfect secret sharing schemes

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

In this paper, information rates of perfect secret sharing schemes are studied, in particular schemes based on connected graphs on six vertices. We discuss a method to derive information-theoretical upper bounds on the optimal information rate and the optimal average information rate. Stinson [19] proved the general result that, for any graphG having maximum degreed, there exists a perfect secret sharing scheme realizingG with (average) information rate at least 2/(d+1). For alld≥3 and ɛ>0, we construct graphs having maximum degreed such that the optimal (average) information rate is at most 2/(d+1−ɛ).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. M. Atici, Optimal information and average information rates of the connected graphs on six vertices, Master's thesis, University of Nebraska, May 1994.

  2. C. Blundo, Secret Sharing Schemes for Access Structures based on Graphs, Tesi di Laurea (1991) (in Italian).

  3. C. Blundo, A. De Santis, L. Gargano, and U. Vaccaro, On the information rate of secret sharing schemes, InAdvances in Cryptology-CRYPTO '92, Lecture Notes in Comput. Sci., Vol. 740, pp. 148–167 (1993).

  4. C. Blundo, A. De Santis, D. R. Stinson, and U. Vaccaro, Graph decompositions and secret sharing schemes,” InAdvances in Cryptology-Proceedings of Eurocrypt '92, Lecture Notes in Comput. Sci., Vol. 658 (1993) pp. 1–24.

  5. E. F. Brickell, Some ideal secret sharing schemes,J. Combin. Math. and Combin. Comput., Vol. 9 (1989) pp. 105–113.

    Google Scholar 

  6. E. F. Brickell and D. R. Stinson, Some improved bounds on the information rate of perfect secret sharing schemes,J. Cryptology, Vol. 5 (1992) pp. 153–166.

    Google Scholar 

  7. Ernest F. Brickell and Daniel M. Davenport, On the classification of ideal secret sharing schemes,J. Cryptology, Vol. 4 (1991) pp. 123–134.

    Google Scholar 

  8. R. M. Capocelli, A. De Santis, L. Gargano, and U. Vaccaro, On the size of shares for secret sharing schemes,J. Cryptology, Vol. 6 (1993), pp. 157–167.

    Google Scholar 

  9. L. Csirmaz, The size of a share must be large, Mathematical Institute of the Hungarian Academy of Science, Preprint No. 54/1993.

  10. Marten van Dijk, A linear construction of perfect secret sharing schemes, April 1994. Submitted toDesigns, Codes, and Cryptography.

  11. R. G. Gallager,Information Theory and Reliable Communications, John Wiley, New York (1968).

    Google Scholar 

  12. W.-A. Jackson and K. Martin, Geometric secret sharing schemes and their duals,Designs, Codes and Cryptography, Vol. 4 (1994) pp. 83–95.

    Google Scholar 

  13. K. M. Martin, Discrete structures in the theory of secret sharing, Ph.D. thesis, Royal Holloway and Bedford New College, University of London (1991).

  14. K. M. Martin, New secret sharing schemes from old,Journal of Combin. Math. and Combin. Comput., Vol. 14 (1993) pp. 65–77.

    Google Scholar 

  15. N. Palmieri, Graphs decomposition for secret sharing schemes, Tesi di Laurea (1993) (in Italian).

  16. A. Shamir, How to share a secret,Commun. of the ACM, Vol. 22 (1979) pp. 612–613.

    Google Scholar 

  17. D. R. Stinson, An explication of secret sharing schemes,Designs, Codes and Cryptography, Vol. 2 (1992) pp. 357–390.

    Google Scholar 

  18. D. R. Stinson, New general lower bounds on the information rate of secret sharing schemes, InAdvances in Cryptology-CRYPTO '92, Lecture Notes in Comput. Sci., Vol. 740 (1993) pp. 168–182.

  19. D. R. Stinson, Decomposition constructions for secret sharing schemes,IEEE Trans. Inform. Theory, Vol. IT-40 (1994) pp. 118–125.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

Communicated by: D. Jungnickel

Rights and permissions

Reprints and permissions

About this article

Cite this article

Van Dijk, M. On the information rate of perfect secret sharing schemes. Des Codes Crypt 6, 143–169 (1995). https://doi.org/10.1007/BF01398012

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF01398012

Keywords

Navigation