Skip to main content
Log in

The optimal information rate for graph access structures of nine participants

  • Research Article
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

Abstract

The information rate is an important metric of the performance of a secret-sharing scheme. In this paper we consider 272 non-isomorphic connected graph access structures with nine vertices and eight or nine edges, and either determine or bound the optimal information rate in each case. We obtain exact values for the optimal information rate for 231 cases and present a method that is able to derive information-theoretical upper bounds on the optimal information rate. Moreover, we apply some of the constructions to determine lower bounds on the information rate. Regarding information rate, we conclude with a full listing of the known optimal information rate (or bounds on the optimal information rate) for all 272 graphs access structures of nine participants.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Shamir A. How to share a secret. Communications of the ACM, 1979, 24: 612–613

    Article  MathSciNet  Google Scholar 

  2. Blakley G R. Safeguarding cryptographic keys. Proceedings of AFIPS National Computer Conference. 1979, 48: 313–317

    Google Scholar 

  3. Yuan H D. Secret sharing with multi-cover adaptive steganography. Information Sciences, 2014, 254(1): 197–212

    Article  MathSciNet  Google Scholar 

  4. Chen C C, Wu W J. A secure Boolean-based multi-secret image sharing scheme. Journal of Systems and Software, 2014, 92(7): 107–114

    Article  Google Scholar 

  5. Ulutas G, Ulutas M, Nabiyev V V. Secret image sharing scheme with adaptive authentication strength. Pattern Recognition Letters, 2013, 34(3): 283–291

    Article  Google Scholar 

  6. Lein H, Miao F Y. Multilevel threshold secret sharing based on the Chinese Remainder Theorem. Information Processing Letters, 2014, 114(9): 504–509

    Article  MATH  MathSciNet  Google Scholar 

  7. Brickell E F, Stinson D R. Some improved bounds on the information rate of perfect secret sharing schemes. Journal of Cryptology, 1992, 5(3): 153–166

    Article  MATH  MathSciNet  Google Scholar 

  8. Lu H C, Fu H L. New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access tructures. Information Sciences, 2013, 240(10): 83–94

    Article  MathSciNet  Google Scholar 

  9. Jackson W, Martin K M. Perfect secret sharing schemes on five participants. Designs, Codes and Cryptography, 1996, 9(3): 267–286

    MATH  MathSciNet  Google Scholar 

  10. van Dijk M. On the information rate of perfect secret sharing schemes. Designs, Codes and Cryptography, 1995, 6(2): 143–169

    Article  MATH  MathSciNet  Google Scholar 

  11. Song Y, Li ZH, Wang WC. The information rate of secret sharing schemes based on seven participants by connect graphs. Lecture Notes in Electrical Engineering, 2012, 127: 637–645

    Article  Google Scholar 

  12. Wang W C, Li Z H, Song Y. The optional information rate of perfect secret sharing schemes. In: Proceedings of the 2011 International Conference on Business Management and Electronic Information. 2011, 207–212

    Chapter  Google Scholar 

  13. Sun H M, Chen B L. Weighted decomposition construction for perfect secret sharing schemes. Computers & Mathematics with Applications, 2002, 43(6): 877–887

    Article  MATH  MathSciNet  Google Scholar 

  14. Gharahi M, Dehkordi M H. The complexity of the graph access structures on six participants. Designs, Codes and Cryptography, 2013, 67(2): 169–173

    Article  MATH  MathSciNet  Google Scholar 

  15. Padríő C, Víćzquez L. Finding lower bounds on the complexity of secret sharing schemes by linear prog ramming. Lecture Notes in Computer Science, 2010, 6034: 344–355

    Article  Google Scholar 

  16. Capocelli R M, De Santis A, Gargano L, Vaccaro U. On the size of shares of secret sharing schemes. Journal of Cryptology, 1993, 6(3): 157–168

    Article  MATH  Google Scholar 

  17. Cover T M, Thomas J A. Elements of Information Theory. 2nd ed. Wiley: New York, 2006

    MATH  Google Scholar 

  18. Stinson D R. Cryptography theory and practice. 3rd ed. CRC/C&H, 2009

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhihui Li.

Additional information

Yun Song received her MS in cryptography from Shaanxi Normal University, China in 2012. She is currently a PhD candidate in cryptography at Shaanxi Normal University. Her research interests lie in information security and quantum secret sharing.

Zhihui Li received her PhD in computer software and theory from Northwestern Polytechnical University, China. She is currently a professor in the College of Mathematics and Information Science at Shaanxi Normal University in China. She has published more than 60 academic papers in international conferences and journals. Her research interests are in the areas of information security, coding theory and quantum information.

Yongming Li received his PhD from Sichuan University. He is currently a professor in the College of Computer Science at Shaanxi Normal University, China. His research interests are in the areas of computational intelligence, quantum logic, quantum computation and quantum information. Dr. Li has published over 200 technical papers in international journals and conference proceedings. He has served as a reviewer to numerous international journals, and as a committee member to many conferences and review panels.

Ren Xin received his PhD from Xi’an University of Architecture and Technology, China in 2012. He got a postdoctoral position in Beijing University of Technology in 2014. He is currently a lecturer in the School of Civil Engineering at Xi’an University of Architecture and Technology in China. His research interests are in the areas of computer graphics, numerical analysis of finite elements and engineering structure reliability theory.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Song, Y., Li, Z., Li, Y. et al. The optimal information rate for graph access structures of nine participants. Front. Comput. Sci. 9, 778–787 (2015). https://doi.org/10.1007/s11704-015-3255-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11704-015-3255-6

Keywords

Navigation