Abstract
In this paper, we devise ideal and probabilistic secret sharing schemes for two kinds of compartmented access structures. The first one is a compartmented access structures with hierarchical compartments. The second one is the compartmented access structures with strictly lower bounds. We propose ideal and probabilistic schemes for these two compartmented access structures by using the idea of bivariate interpolation.
Similar content being viewed by others
References
Blakley, G.R.: Safeguarding cryptographic keys, National Computer Conference, New York, Montvale, NJ, USA, vol. 48 of AFIPS Conference Proceedings (1979)
Brickell, E.F.: Some ideal secret sharing schemes. J. Combin. Math. Combin. Comput. 9(2), 105–113 (1989)
Beimel, A.: Secret-Sharing schemes: A survey. Proc. IWCC 2011, Qingdao, China LNCS 6639, 11–46 (2011)
Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. Proc. Adv. Cryptol, LNCS 403, 27–35 (1990)
Ding, C., Laihonen, T., Renvall, A.: Linear multi-secret sharing schemes and error-correcting codes. J. Univ. Comput. Sci. 3(9), 1023–1036 (1997)
Ding, C., Kohel, D., Ling, S.: Secret sharing with a class of ternary codes. Theor. Comput. Sci. 246, 285–298 (2000)
Ding, C., Yuan, J.: Covering and secret sharing with linear codes. In: Discrete Mathematics and Theoretical Computer Science, Lecture Notes in Computer Science 2731, 2003, pp 11–25. Springer Verlag (2003)
Ding, C., Salomaa, A.: Secret sharing schemes with nice access structures. Fundam. Inf. - icae 71(1-2), 65–79 (2006)
Farràs, O., Padró, C., Xing, C., Yang, A.: Natural generalizations of threshold secret sharing. IEEE Trans. Inf. Theory 60(3), 1652–1664 (2014)
Farràs, O., Martí-Farré, J., Padró, C.: Ideal multipartite secret sharing schemes. J. Cryptol. 25(3), 434–463 (2012)
Ito, M., Saito, A., Nishizeki, T.: Multiple assignment scheme for sharing secret. J. Cryptol. 6(1), 15–20 (1993)
Liu, J., Mesnager, S., Chen, L.: Secret Sharing Schemes with General Access Structures. http://eprint.iacr.org/2015/1139.pdf
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Simmons, G.J.: How to (really) share a secret. Proc. Adv. Cryptol, LNCS 403, 390–448 (1990)
Stinson, D.R.: An explication of secret sharing schemes. Des. Codes Cryptogr. 2(4), 357–390 (1992)
Tassa, T., Dyn, N.: Multipartite secret sharing by bivariate interpolation. J. Cryptol. 22(2), 227–258 (2009)
Tassa, T.: Hierarchical threshold secret sharing. J. Cryptol. 20(2), 237–264 (2007)
Wang, Y., Wu, Q., W, D., et al.: Further ideal multipartite access structures from integer polymatroids. Sci. China Inf. Sci. 58(7), 1–13 (2015)
Wang, X., Fu, F. -W., Guang, X.: Probabilistic secret sharing schemes for multipartite access structures. IEICE Trans. Fundam. E99-A(4), 856–862 (2016)
Yu, Y., Wang, M.: A probabilistic secret sharing scheme for a compartmented access structure. Proc. ICICS’ 2011, Beijing, China LNCS 7043, 136–142 (2011)
Acknowledgments
The authors are very grateful to the reviewers and the Editor, for their comments and suggestions that improved the presentation and quality of this paper. This research was supported by NTU Tier 1 grant RG143/14, the National Key Basic Research Program of China (Grant No. 2013CB834204), and the National Natural Science Foundation of China (Grant Nos. 61571243 and 61171082).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, X., Xiang, C. & Fu, FW. Secret sharing schemes for compartmented access structures. Cryptogr. Commun. 9, 625–635 (2017). https://doi.org/10.1007/s12095-016-0205-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12095-016-0205-6