Constructions of some secret sharing schemes based on linear codes
- Authors: Ratseev S.M.1
-
Affiliations:
- Ulyanovsk State University
- Issue: Vol 24, No 3 (2024)
- Pages: 330-341
- Section: Mathematics
- URL: https://journals.rcsi.science/1816-9791/article/view/353373
- DOI: https://doi.org/10.18500/1816-9791-2024-24-3-330-341
- EDN: https://elibrary.ru/FDXFXL
- ID: 353373
Cite item
Full Text
Abstract
Keywords
About the authors
Sergey Mihailovich Ratseev
Ulyanovsk State University
ORCID iD: 0000-0003-4995-9418
Scopus Author ID: 26022120300
Russia, 432970, Ul'yanovsk, L. Tolstogo st., 42
References
- McEliece R. J., Sarwate D. V. On sharing secrets and Reed – Solomon codes // Communications of the ACM. 1981. Vol. 24, iss. 9. P. 583–584. https://doi.org/10.1145/358746.358762
- Renvall A., Ding C. The access structure of some secret-sharing schemes // Information Security and Privacy. ACISP 1996 / ed. by J. Pieprzyk, J. Seberry. Berlin, Heidelberg : Springer, 1996. P. 67–78. (Lecture Notes in Computer Science, vol. 1172). https://doi.org/10.1007/BFb0023288
- Ding C., Laihonen T., Renvall A. Linear multisecret-sharing schemes and error-correcting codes // Journal of Universal Computer Science. 1997. Vol. 3, iss. 9. P. 1023–1036.
- Karnin E. D., Greene J. W., Hellman M. E. On secret sharing systems // IEEE Transactions on Information Theory. 1983. Vol. 29, iss. 1. P. 35–41. https://doi.org/10.1109/TIT.1983.1056621
- Pieprzyk J., Zhang X. M. Ideal threshold schemes from MDS codes // Information Security and Cryptology — ICISC 2002 / ed. by P. J. Lee, C. H. Lim. Berlin, Heidelberg : Springer, 2003. P. 253–263. (Lecture Notes in Computer Science, vol. 2587). https://doi.org/10.1007/3-540-36552-4_18
- Massey J. L. Minimal codewords and secret sharing // Proceedings of the 6th Joint Swedish-Russian Workshop on Information Theory. Molle, Sweden, 1993. P. 276–279.
- Massey J. L. Some applications of coding theory in cryptography // Codes and Ciphers: Cryptography and Coding IV / ed. by P. G. Farrell. Essex, England : Formara Ltd., 1995. P. 33–47.
- Tang C., Gao S., Zhang C. The optimal linear secret sharing scheme for any given access structure // Journal of Systems Science and Complexity. 2013. Vol. 26, № 4. P. 634–649. https://doi.org/10.1007/s11424-013-2131-4
- Cramer R., Damgard I. B., Dottling N., Fehr S., Spini G. Linear secret sharing schemes from error correcting codes and universal hash functions // Advances in Cryptology — EUROCRYPT 2015 / ed. by E. Oswald, M. Fischlin. Berlin, Heidelberg : Springer, 2015. P. 313–336. (Lecture Notes in Computer Science, vol. 9057). https://doi.org/10.1007/978-3-662-46803-6_11
- Tentu A. N., Paul P., Venkaiah V. Ch. Ideal and perfect hierarchical secret sharing schemes based on MDS codes // Proceeding of International Conference on Applied and Computational Mathematics. Ankara, Turkey, 2012. P. 256–272.
- Рацеев С. М. Элементы высшей алгебры и теории кодирования : учеб. пособие для вузов. Санкт-Петербург : Лань, 2022. 656 с. EDN: EPVGNW
- Рацеев С. М. Математические методы защиты информации : учеб. пособие для вузов. Санкт-Петербург : Лань, 2022. 544 с. EDN: QZANSJ
Supplementary files


