Abstract
A perfect secret-sharing scheme is a method of distributing a secret among a set of participants such that only qualified subsets of participants can recover the secret and the joint shares of the participants in any unqualified subset is statistically independent of the secret. The set of all qualified subsets is called the access structure of the scheme. In a graph-based access structure, each vertex of a graph \(G\) represents a participant and each edge of \(G\) represents a minimal qualified subset. The information ratio of a perfect secret-sharing scheme is defined as the ratio between the maximum length of the share given to a participant and the length of the secret. The average information ratio is the ratio between the average length of the shares given to the participants and the length of the secret. The infimum of the (average) information ratios of all possible perfect secret-sharing schemes realizing a given access structure is called the (average) information ratio of the access structure. Very few exact values of the (average) information ratio of infinite families of access structures are known. Csirmaz and Tardos have found the information ratio of all trees. Based on their method, we develop our approach to determining the exact values of the average information ratio of access structures based on trees.
Similar content being viewed by others
References
Beimel A.: Secret-sharing schemes: a survey. In: Proceedings of 3rd International Workshop Coding and Cryptology, Lecture Notes in Computer Science, vol. 6639, pp. 11–46 (2011).
Blakley G.R.: Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, 1979. American Federation of Information Processing Societies Proceedings, vol. 48, pp. 313–317 (1979).
Blundo C., De Santis A., Stinson D.R., Vaccaro U.: Graph decompositions and secret sharing schemes. J. Cryptol. 8, 39–64 (1995).
Brickell E.F., Davenport D.M.: On the classification of ideal secret sharing schemes. J. Cryptol. 4, 123–134 (1991).
Csirmaz L.: The size of a share must be large. J. Cryptol. 10, 223–231 (1997).
Csirmaz L., Tardos G.: Exact bounds on tree based secret sharing schemes. Tatracrypt, Slovakia (2007).
Marti-Farré J., Padró C.: On secret sharing schemes, matroids and polymatroids. J. Math. Cryptol. 4, 95–120 (2010).
Shamir A.: How to share a secret. Commun. ACM 22, 612–613 (1979).
Stinson D.R.: An explication of secret sharing schemes. Des. Codes Cryptogr. 2, 357–390 (1992).
Stinson D.R.: Decomposition constructions for secret sharing schemes. IEEE Trans. Inform. Theory 40, 118–125 (1994).
van Dijk M.: On the information rate of perfect secret sharing schemes. Des. Codes Cryptogr. 6, 143–169 (1995).
Acknowledgments
The authors would like to express their deep gratefulness to the reviewers for their detail comments and valuable suggestions which lead to great improvement in the presentation of the paper. The work of Hui-Chuan Lu was supported in part by NSC 100-2115-M-239-001 and the work of Hung-Lin Fu was supported in part by NSC 97-2115-M-009-011-MY3.
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by C. Blundo.
Rights and permissions
About this article
Cite this article
Lu, HC., Fu, HL. The exact values of the optimal average information ratio of perfect secret-sharing schemes for tree-based access structures. Des. Codes Cryptogr. 73, 37–46 (2014). https://doi.org/10.1007/s10623-012-9792-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-012-9792-1