Skip to main content
Log in

How to Build Robust Shared Control Systems

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

Previous researchers have designed shared control schemes with a view to minimising the likelihood that participants will conspire to perform an unauthorised act. But, human nature being what it is, systems inevitably fail; so shared control schemes should also be designed so that the police can identify conspirators after the fact. This requirement leads us to search for schemes with sparse access structures. We show how this can be done using ideas from coding theory. In particular, secret sharing schemes based on geometric codes whose dual [n,k,d] codes have d and n as their only nonzero weights are suitable. We determine their access structures and analyse their properties. We have found almost all of them, and established some relations among codes, designs and secret-sharing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. R.J. Anderson, Why Cryptosystems Fail, Communications of the ACMVol 37, No.11 (1994) pp. 32-40.

    Article  Google Scholar 

  2. E.F. Assmus, Jr. and J.D. Key, Designs and Their Codes, Cambridge University Press, Cambridge (1992).

    Google Scholar 

  3. G.R. Blakley, Safeguarding cryptographic keys, Proceedings of NCC AFIPS (1979) pp. 313-317.

  4. A. Bonisoli, Every equidistance linear code is a sequence of dual Hamming codes, Ars CombinatoriaVol. 18 (1983) pp. 181-186.

    Google Scholar 

  5. R. Calderbank, W.M. Kantor, The geometry of two-weight codes, Bulletin of the London Mathematical Society, Vol. 18 (1986) pp. 97-122.

    Google Scholar 

  6. Y. Desmedt, Y. Frankel, Threshold cryptosystems, Advances in Cryptology: Proceedings of Crypto 89, Lecture Notes in Computer Science, Springer-Verlag, New York, 435 (1990) pp. 307-315.

    Google Scholar 

  7. E.D. Karnin, J.W. Green, M. Hellman, On secret sharing systems, IEEE Transactions on Information Theory, Vol. IT-29 (1983) pp. 644-654.

    Google Scholar 

  8. F.J. MacWilliams, N.J.A. Sloane, The Theory of Error-Correcting CodesNorth-Holland, Amsterdam (1978).

    Google Scholar 

  9. J.L. Massey, Minimal codewords and secret sharing, Proceedings of the 6th Joint Swedish-RussianWorkshop on Information Theory, Mölle, Sweden, August 22-27, 1993 pp. 276-279.

  10. J.L. Massey, Some applications of coding theory in cryptography, Codes and Ciphers: Cryptography and Coding IV(Ed. P.G. Farrell), IMA, England (1995) pp. 33-47.

    Google Scholar 

  11. R.J. McEliece, D.V. Sarwate, On sharing secrets and Reed-Solomon codes, Communications of the ACMVol. 24 (1981) pp. 583-584.

    Article  Google Scholar 

  12. M.K. Reiter, M.K. Franklin, J.B. Lacy, R.A. Wright, The Omega Key Management Service, Proceedings of 3rd ACM Conference on Computer and Communications Security, ACM Press (1997) pp. 38-47.

  13. A. Shamir, How to share a secret, Communications of the ACM, Vol. 22 (1979) pp. 612-613.

    Article  Google Scholar 

  14. VISA Security Module Operations Manual, VISA, 1986

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Anderson, R., Ding, C., Helleseth, T. et al. How to Build Robust Shared Control Systems. Designs, Codes and Cryptography 15, 111–124 (1998). https://doi.org/10.1023/A:1026421315292

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1026421315292

Navigation