Skip to main content
Log in

Secret sharing schemes based on additive codes over GF(4)

  • Original Paper
  • Published:
Applicable Algebra in Engineering, Communication and Computing Aims and scope

Abstract

A secret sharing scheme (SSS) was introduced by Shamir in 1979 using polynomial interpolation. Later it turned out that it is equivalent to an SSS based on a Reed–Solomon code. SSSs based on linear codes have been studied by many researchers. However there is little research on SSSs based on additive codes. In this paper, we study SSSs based on additive codes over GF(4) and show that they require at least two steps of calculations to reveal the secret. We also define minimal access structures of SSSs from additive codes over GF(4) and describe SSSs using some interesting additive codes over GF(4) which contain generalized 2-designs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Assmus, E.F., Mattson, H.F.: New 5-designs. J. Comb. Theory 6, 122–151 (1969)

    Article  MATH  MathSciNet  Google Scholar 

  2. Blakley, G.R.: Safeguarding cryptographic keys. In: National Computer Conference, pp. 313–317. American Federation of Information Processing Societies (1979)

  3. Carreras, F., Magaña, A., Munuera, C.: The accessibility of an access structure. RAIRO Theor. Inf. Appl. 40(04), 559–567 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  4. Delsarte, P.: Four fundamental parameters of a code and their combinatorial significance. Inf. Control 23, 407–438 (1973)

    Article  MATH  MathSciNet  Google Scholar 

  5. Ding, C., Kohel, D.R., Ling, S.: Secret-sharing with a class of ternary codes. Theor. Comput. Sci. 246(1), 285–298 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  6. Ding, C., Yuan, J.: Covering and secret sharing with linear codes. In: Calude C. S., Dinneen M. J., Vajnovszki V (eds.) Discrete Mathematics and Theoretical Computer Science, pp. 11–25. Springer, Heidelberg (2003)

  7. Dougherty, S.T., Mesnager, S., Solé, P.: Secret-sharing schemes based on self-dual codes. In: Information Theory Workshop. ITW’08. IEEE (2008)

  8. Höhn, G.: Self-dual codes over the Kleinian four group. Math. Ann. 327(2), 227–255 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  9. Huffman, W. C., Gaborit, P., Kim, J.-L., Pless, V.: On additive \(GF (4)\) codes. In: Codes and Association Schemes: DIMACS Workshop Codes and Association Schemes, November 9–12, 1999, DIMACS Center. vol. 56. American Mathematical Society (2001)

  10. Huffman, W.C., Pless, V.: Fundamentals of Error-Correcting Codes, pp. 291–337. Cambridge University Press, New York (2003)

    Book  MATH  Google Scholar 

  11. Kim, J.-L., Pless, V.: Designs in additive codes over \(GF(4)\). Des. Codes Cryptogr. 30(2), 187–199 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  12. Li, Z., Xue, T.X., Lai, H.: Secret sharing schemes from binary linear codes. Inf. Sci. 180(22), 4412–4419 (2010)

    Article  MATH  MathSciNet  Google Scholar 

  13. MacWilliams, F.J., Odlyzko, A.M., Sloane, N.J.A., Ward, H.N.: Self-dual codes over \(GF(4)\). J. Comb. Theory Ser. A 25(3), 288–318 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  14. Massey, J. L.: Minimal codewords and secret sharing. In: Proceedings 6th Joint Swedish–Russian International Workshop on Information Theory, pp. 276–279 (1993)

  15. McEliece, R.J., Sarwate, D.V.: On sharing secrets and Reed–Solomon codes. Commun. ACM 24(9), 583–584 (1981)

    Article  MathSciNet  Google Scholar 

  16. Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  17. Yuan, J., Ding, C.: Secret sharing schemes from three classes of linear codes. IEEE Trans. Inf. Theory 52(1), 206–212 (2006)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nari Lee.

Additional information

J.-L. Kim was supported by Basic Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2013R1A1A2005172). N. Lee was partially supported by the National Institute for Mathematical Sciences (No. A21503).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, JL., Lee, N. Secret sharing schemes based on additive codes over GF(4). AAECC 28, 79–97 (2017). https://doi.org/10.1007/s00200-016-0296-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00200-016-0296-5

Keywords

Mathematics Subject Classification

Navigation