Skip to main content
Log in

The exact values of the optimal average information ratio of perfect secret-sharing schemes for tree-based access structures

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

A perfect secret-sharing scheme is a method of distributing a secret among a set of participants such that only qualified subsets of participants can recover the secret and the joint shares of the participants in any unqualified subset is statistically independent of the secret. The set of all qualified subsets is called the access structure of the scheme. In a graph-based access structure, each vertex of a graph \(G\) represents a participant and each edge of \(G\) represents a minimal qualified subset. The information ratio of a perfect secret-sharing scheme is defined as the ratio between the maximum length of the share given to a participant and the length of the secret. The average information ratio is the ratio between the average length of the shares given to the participants and the length of the secret. The infimum of the (average) information ratios of all possible perfect secret-sharing schemes realizing a given access structure is called the (average) information ratio of the access structure. Very few exact values of the (average) information ratio of infinite families of access structures are known. Csirmaz and Tardos have found the information ratio of all trees. Based on their method, we develop our approach to determining the exact values of the average information ratio of access structures based on trees.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Beimel A.: Secret-sharing schemes: a survey. In: Proceedings of 3rd International Workshop Coding and Cryptology, Lecture Notes in Computer Science, vol. 6639, pp. 11–46 (2011).

  2. Blakley G.R.: Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, 1979. American Federation of Information Processing Societies Proceedings, vol. 48, pp. 313–317 (1979).

  3. Blundo C., De Santis A., Stinson D.R., Vaccaro U.: Graph decompositions and secret sharing schemes. J. Cryptol. 8, 39–64 (1995).

    Google Scholar 

  4. Brickell E.F., Davenport D.M.: On the classification of ideal secret sharing schemes. J. Cryptol. 4, 123–134 (1991).

    Google Scholar 

  5. Csirmaz L.: The size of a share must be large. J. Cryptol. 10, 223–231 (1997).

    Google Scholar 

  6. Csirmaz L., Tardos G.: Exact bounds on tree based secret sharing schemes. Tatracrypt, Slovakia (2007).

  7. Marti-Farré J., Padró C.: On secret sharing schemes, matroids and polymatroids. J. Math. Cryptol. 4, 95–120 (2010).

    Google Scholar 

  8. Shamir A.: How to share a secret. Commun. ACM 22, 612–613 (1979).

    Google Scholar 

  9. Stinson D.R.: An explication of secret sharing schemes. Des. Codes Cryptogr. 2, 357–390 (1992).

    Google Scholar 

  10. Stinson D.R.: Decomposition constructions for secret sharing schemes. IEEE Trans. Inform. Theory 40, 118–125 (1994).

    Google Scholar 

  11. van Dijk M.: On the information rate of perfect secret sharing schemes. Des. Codes Cryptogr. 6, 143–169 (1995).

Download references

Acknowledgments

The authors would like to express their deep gratefulness to the reviewers for their detail comments and valuable suggestions which lead to great improvement in the presentation of the paper. The work of Hui-Chuan Lu was supported in part by NSC 100-2115-M-239-001 and the work of Hung-Lin Fu was supported in part by NSC 97-2115-M-009-011-MY3.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hui-Chuan Lu.

Additional information

Communicated by C. Blundo.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lu, HC., Fu, HL. The exact values of the optimal average information ratio of perfect secret-sharing schemes for tree-based access structures. Des. Codes Cryptogr. 73, 37–46 (2014). https://doi.org/10.1007/s10623-012-9792-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-012-9792-1

Keywords

Mathematics Subject Classification (2000)

Navigation