abstract
In this paper we study secret sharing schemes whose access structure has three or four minimal qualified subsets. The ideal case is completely characterized and for the non-ideal case we provide bounds on the optimal information rate.
Similar content being viewed by others
References
G. R. Blakley (1979) ArticleTitleSafeguarding cryptographic keys AFIPS Conf. Proc. 48 313–317
C. Blundo A. Santis ParticleDe R. Simone ParticleDe U. Vaccaro (1997) ArticleTitleTight bounds on the information rate of secret sharing schemes Designs, Codes Cryptography 11 107–122
C. Blundo, A. De Santis, L. Gargano and U. Vaccaro, On the information rate of secret sharing schemes. Advances in Cryptology CRYPTO’92, Lecture Notes in Comput. Sci. Vol. 740 pp. 148–167.
C. Blundo A. Santis ParticleDe D. R. Stinson U. Vaccaro (1995) ArticleTitleGraph decompositions and secret sharing schemes J. Cryptol. 8 39–64
E. F. Brickell (1989) ArticleTitleSome ideal secret sharing schemes J. Comb. Math. Comb. Comput. 9 105–113
E. F. Brickell D. M. Davenport (1991) ArticleTitleOn the classification of ideal secret sharing schemes J. Cryptol. 4 123–134
E. F. Brickell D. R. Stinson (1992) ArticleTitleSome improved bounds on the information rate of perfect secret sharing schemes J. Cryptol. 5 153–166
R. M. Capocelli A. Santis ParticleDe L. Gargano U. Vaccaro (1993) ArticleTitleOn the size of shares of secret sharing schemes J. Cryptol. 6 157–168
M. Ito A. Saito T. Nishizeki (1987) ArticleTitleSecret sharing scheme realizing any access structure Proc. IEEE Globecom 87 99–102
W. A. Jackson K. M. Martin (1994) ArticleTitleGeometric secret sharing schemes and their duals Designs, Codes Cryptograph. 4 83–95
W. A. Jackson K. M. Martin (1996) ArticleTitlePerfect secret sharing schemes on five participants Designs, Codes Cryptograph. 9 267–286
C. Padró G. Sáez (2000) ArticleTitleSecret sharing schemes with bipartite access structure IEEE Trans. Inform. Theory 46 IssueID7 2596–2604
A. Shamir (1979) ArticleTitleHow to share a secret Commun. ACM 22 612–613
G. J. Simmons, An introduction to shared secret and/or shared control schemes and their application, Contemporary Cryptology. The Science of Information Integrity, IEEE Press (1991) pp. 441–497.
D.R. Stinson (1992) ArticleTitleAn explication of secret sharing schemes Design, Codes Cryptograph. 2 357–390
D. R. Stinson (1994) ArticleTitleDecomposition constructions for secret-sharing schemes IEEE Trans. Inform. Theory 40 118–125
D. R Stinson (1955) Cryptography: Theory and Practice CRC Press Inc. Boca Raton
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by P. Wild
AMS Classification 94A62
Rights and permissions
About this article
Cite this article
Martí-Farré, J., Padró, C. Secret Sharing Schemes with Three or Four Minimal Qualified Subsets. Des Codes Crypt 34, 17–34 (2005). https://doi.org/10.1007/s10623-003-4192-1
Received:
Revised:
Accepted:
Issue Date:
DOI: https://doi.org/10.1007/s10623-003-4192-1