Abstract
In this paper, information rates of perfect secret sharing schemes are studied, in particular schemes based on connected graphs on six vertices. We discuss a method to derive information-theoretical upper bounds on the optimal information rate and the optimal average information rate. Stinson [19] proved the general result that, for any graphG having maximum degreed, there exists a perfect secret sharing scheme realizingG with (average) information rate at least 2/(d+1). For alld≥3 and ɛ>0, we construct graphs having maximum degreed such that the optimal (average) information rate is at most 2/(d+1−ɛ).
Similar content being viewed by others
References
M. Atici, Optimal information and average information rates of the connected graphs on six vertices, Master's thesis, University of Nebraska, May 1994.
C. Blundo, Secret Sharing Schemes for Access Structures based on Graphs, Tesi di Laurea (1991) (in Italian).
C. Blundo, A. De Santis, L. Gargano, and U. Vaccaro, On the information rate of secret sharing schemes, InAdvances in Cryptology-CRYPTO '92, Lecture Notes in Comput. Sci., Vol. 740, pp. 148–167 (1993).
C. Blundo, A. De Santis, D. R. Stinson, and U. Vaccaro, Graph decompositions and secret sharing schemes,” InAdvances in Cryptology-Proceedings of Eurocrypt '92, Lecture Notes in Comput. Sci., Vol. 658 (1993) pp. 1–24.
E. F. Brickell, Some ideal secret sharing schemes,J. Combin. Math. and Combin. Comput., Vol. 9 (1989) pp. 105–113.
E. F. Brickell and D. R. Stinson, Some improved bounds on the information rate of perfect secret sharing schemes,J. Cryptology, Vol. 5 (1992) pp. 153–166.
Ernest F. Brickell and Daniel M. Davenport, On the classification of ideal secret sharing schemes,J. Cryptology, Vol. 4 (1991) pp. 123–134.
R. M. Capocelli, A. De Santis, L. Gargano, and U. Vaccaro, On the size of shares for secret sharing schemes,J. Cryptology, Vol. 6 (1993), pp. 157–167.
L. Csirmaz, The size of a share must be large, Mathematical Institute of the Hungarian Academy of Science, Preprint No. 54/1993.
Marten van Dijk, A linear construction of perfect secret sharing schemes, April 1994. Submitted toDesigns, Codes, and Cryptography.
R. G. Gallager,Information Theory and Reliable Communications, John Wiley, New York (1968).
W.-A. Jackson and K. Martin, Geometric secret sharing schemes and their duals,Designs, Codes and Cryptography, Vol. 4 (1994) pp. 83–95.
K. M. Martin, Discrete structures in the theory of secret sharing, Ph.D. thesis, Royal Holloway and Bedford New College, University of London (1991).
K. M. Martin, New secret sharing schemes from old,Journal of Combin. Math. and Combin. Comput., Vol. 14 (1993) pp. 65–77.
N. Palmieri, Graphs decomposition for secret sharing schemes, Tesi di Laurea (1993) (in Italian).
A. Shamir, How to share a secret,Commun. of the ACM, Vol. 22 (1979) pp. 612–613.
D. R. Stinson, An explication of secret sharing schemes,Designs, Codes and Cryptography, Vol. 2 (1992) pp. 357–390.
D. R. Stinson, New general lower bounds on the information rate of secret sharing schemes, InAdvances in Cryptology-CRYPTO '92, Lecture Notes in Comput. Sci., Vol. 740 (1993) pp. 168–182.
D. R. Stinson, Decomposition constructions for secret sharing schemes,IEEE Trans. Inform. Theory, Vol. IT-40 (1994) pp. 118–125.
Author information
Authors and Affiliations
Additional information
Communicated by: D. Jungnickel
Rights and permissions
About this article
Cite this article
Van Dijk, M. On the information rate of perfect secret sharing schemes. Des Codes Crypt 6, 143–169 (1995). https://doi.org/10.1007/BF01398012
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF01398012