Skip to main content

On the decomposition constructions for perfect secret sharing schemes

  • Session 2: Secret Sharing
  • Conference paper
  • First Online:
Information and Communications Security (ICICS 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1334))

Included in the following conference series:

  • 226 Accesses

Abstract

We propose the concept of weight-decomposition construction for perfect secret sharing schemes. This construction is more general than previous constructions. Based on the weight-decomposition construction, we improve the information rate in 4 cases of the left unsolved 18 cases of secret sharing schemes for connected graphs on six vertices. In addition, we also propose some efficient decomposition constructions for perfect secret sharing schemes with access structures of constant rank. Compared with the best previous constructions, our constructions have some improved lower bounds on the information rate.

This research was supported in part by the National Science Council of the Republic of China under grant number NSC-86-2213-E-324-002.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Benaloh and J. Leichter, “Generalized secret sharing and monotone functions,” in Advances in Cryptology-Crypto'88 Proceedings, Lecture Notes in Computer Science, Vol. 403, Springer-Verlag, Berlin, pp. 27–35, 1990.

    Google Scholar 

  2. C. Blundo, A. De Santis, L. Gargano, and U. Vaccaro, “On the information rate of secret sharing schemes,” in Advance in Cryptology-CRYPTO'92, Lecture Notes in Comput. Sci., Vol. 740, pp. 148–167, 1993.

    Google Scholar 

  3. C. Blundo, A. De Santis, D.R. Stinson and U. Vaccaro, “Graph decompositions and secret sharing schemes,” in Advance in Cryptology-Proceedings of Eurocrypt'92, Lecture Notes in Comput. Sci., Vol. 658, pp. 1–24, 1993.

    Google Scholar 

  4. C. Blundo, A. De Santis, D.R. Stinson and U. Vaccaro, “Graph decompositions and secret sharing schemes,” Journal of Cryptology, Vol. 8, pp. 39–63, 1995.

    Article  Google Scholar 

  5. E.F. Brickell and D.R. Stinson, “Some improved bounds on the information rate of perfect secret sharing schemes,” Journal of Cryptology, Vol. 5, pp. 153–166, 1992.

    Article  Google Scholar 

  6. R. M. Capocelli, A. De Santis, L. Gargano, and U. Vaccaro, “On the size of shares for secret sharing schemes,” Journal of Cryptology, Vol. 6, pp. 157–167, 1993.

    Article  Google Scholar 

  7. M. van Dijk, “On the information rate of perfect secret sharing schemes,” Designs, Codes and Cryptography, Vol. 6, pp. 143–169, 1995.

    Google Scholar 

  8. R.W. Hamming, Coding and Information Theory, Englewood Cliffs, Reading, NJ:Prentice-Hall, 1986.

    Google Scholar 

  9. M. Ito, A. Saito and T. Nishizeki, “Secret sharing scheme realizing general access structure,” in Proc. IEEE Globecom'87, Tokyo, pp. 99–102, 1987.

    Google Scholar 

  10. M. Ito, A. Saito and T. Nishizeki, “Multiple assignment scheme for sharing secret,” Journal of Cryptology, Vol. 6, pp. 15–20, 1993.

    Google Scholar 

  11. D.R. Stinson, “New general lower bounds on the information rate of secret sharing schemes,” in Advance in Cryptology-CRYPTO'92, Lecture Notes in Comput. Sci., Vol. 740, pp. 168–182, 1993.

    Google Scholar 

  12. D.R. Stinson, “Decomposition constructions for secret sharing schemes,” IEEE Trans. Inform. Theory, Vol. IT-40, pp. 118–125, 1994.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yongfei Han Tatsuaki Okamoto Sihan Qing

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag

About this paper

Cite this paper

Sun, HM., Chen, BL. (1997). On the decomposition constructions for perfect secret sharing schemes. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028461

Download citation

  • DOI: https://doi.org/10.1007/BFb0028461

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63696-0

  • Online ISBN: 978-3-540-69628-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics