Abstract
In this paper we study linear secret sharing schemes by monotone span programs, according to the relation between realizing access structures by linear secret sharing schemes and computing monotone Boolean functions by monotone span programs. We construct some linear secret sharing schemes. Furthermore, we study the rearrangements of access structures that is very important in practice.
Similar content being viewed by others
References
Beimel, A. Secure schemes for secret sharing and key distribution. PhD thesis, Technion—Israel Institute of Techonlogy, 1996
Blackley, G.R. Safeguarding cryptographic keys. In R. E. Merwin, J.T. Zanca, and M. Smith, editors, In: Proc. of the 1979 AFIPS National Computer Conference, Vol.48 of AFIPS Conference proceedings, 313–317. AFIPS Press, 1979
Ito, M., Saito, A., Nishizeki, T. Secret sharing schemes realizing general access structure. In: Proc. of the IEEE Global Telecommunication Conf., Globecom 87, 99–102, 1987 Journal version: Multiple Assignment Scheme for Sharing Secret. J. of Cryptology, 6(1): 15–20 1993
Shamir, A. How to share a secret. Communications of the ACM, 22: 612–613 (1979)
Simmons, G.J. Contemporary Cryptology—The Science of Information Integrity, 1992
Author information
Authors and Affiliations
Corresponding author
Additional information
Supported by the National Natural Science Foundation of China (90304012, 90204016, 2003AA144030)
Rights and permissions
About this article
Cite this article
Xiao, Ll., Liu, Ml. Linear Secret Sharing Schemes and Rearrangements of Access Structures. Acta Mathematicae Applicatae Sinica, English Series 20, 685–694 (2004). https://doi.org/10.1007/s10255-004-0206-7
Received:
Revised:
Issue Date:
DOI: https://doi.org/10.1007/s10255-004-0206-7