Constructions of some secret sharing schemes based on linear codes
- Authors: Ratseev S.M.1
-
Affiliations:
- Ulyanovsk State University
- Issue: Vol 24, No 3 (2024)
- Pages: 330-341
- Section: Mathematics
- URL: https://journals.rcsi.science/1816-9791/article/view/353373
- DOI: https://doi.org/10.18500/1816-9791-2024-24-3-330-341
- EDN: https://elibrary.ru/FDXFXL
- ID: 353373
Cite item
Full Text
Abstract
There are perfect and ideal threshold secret sharing schemes, for example, Shamir’s secret sharing scheme. For the case of general secret sharing schemes with an arbitrary access structure, it is possible to construct a perfect scheme for any access structure (for example, the Ito – Saito – Nishizeki scheme, the Benaloh – Leichter scheme), but in general, such a scheme will not be an ideal secret sharing scheme. In the paper, for some classes of access structures, the construction of perfect and ideal secret sharing schemes based on linear codes is given. We also give a construction of perfect verifiable secret sharing schemes for any access structure for which there is a line code that implements this structure.
Keywords
About the authors
Sergey Mihailovich Ratseev
Ulyanovsk State University
ORCID iD: 0000-0003-4995-9418
Scopus Author ID: 26022120300
Russia, 432970, Ul'yanovsk, L. Tolstogo st., 42
References
- McEliece R. J., Sarwate D. V. On sharing secrets and Reed – Solomon codes // Communications of the ACM. 1981. Vol. 24, iss. 9. P. 583–584. https://doi.org/10.1145/358746.358762
- Renvall A., Ding C. The access structure of some secret-sharing schemes // Information Security and Privacy. ACISP 1996 / ed. by J. Pieprzyk, J. Seberry. Berlin, Heidelberg : Springer, 1996. P. 67–78. (Lecture Notes in Computer Science, vol. 1172). https://doi.org/10.1007/BFb0023288
- Ding C., Laihonen T., Renvall A. Linear multisecret-sharing schemes and error-correcting codes // Journal of Universal Computer Science. 1997. Vol. 3, iss. 9. P. 1023–1036.
- Karnin E. D., Greene J. W., Hellman M. E. On secret sharing systems // IEEE Transactions on Information Theory. 1983. Vol. 29, iss. 1. P. 35–41. https://doi.org/10.1109/TIT.1983.1056621
- Pieprzyk J., Zhang X. M. Ideal threshold schemes from MDS codes // Information Security and Cryptology — ICISC 2002 / ed. by P. J. Lee, C. H. Lim. Berlin, Heidelberg : Springer, 2003. P. 253–263. (Lecture Notes in Computer Science, vol. 2587). https://doi.org/10.1007/3-540-36552-4_18
- Massey J. L. Minimal codewords and secret sharing // Proceedings of the 6th Joint Swedish-Russian Workshop on Information Theory. Molle, Sweden, 1993. P. 276–279.
- Massey J. L. Some applications of coding theory in cryptography // Codes and Ciphers: Cryptography and Coding IV / ed. by P. G. Farrell. Essex, England : Formara Ltd., 1995. P. 33–47.
- Tang C., Gao S., Zhang C. The optimal linear secret sharing scheme for any given access structure // Journal of Systems Science and Complexity. 2013. Vol. 26, № 4. P. 634–649. https://doi.org/10.1007/s11424-013-2131-4
- Cramer R., Damgard I. B., Dottling N., Fehr S., Spini G. Linear secret sharing schemes from error correcting codes and universal hash functions // Advances in Cryptology — EUROCRYPT 2015 / ed. by E. Oswald, M. Fischlin. Berlin, Heidelberg : Springer, 2015. P. 313–336. (Lecture Notes in Computer Science, vol. 9057). https://doi.org/10.1007/978-3-662-46803-6_11
- Tentu A. N., Paul P., Venkaiah V. Ch. Ideal and perfect hierarchical secret sharing schemes based on MDS codes // Proceeding of International Conference on Applied and Computational Mathematics. Ankara, Turkey, 2012. P. 256–272.
- Рацеев С. М. Элементы высшей алгебры и теории кодирования : учеб. пособие для вузов. Санкт-Петербург : Лань, 2022. 656 с. EDN: EPVGNW
- Рацеев С. М. Математические методы защиты информации : учеб. пособие для вузов. Санкт-Петербург : Лань, 2022. 544 с. EDN: QZANSJ
Supplementary files


