Abstract
The information rate is an important metric of the performance of a secret-sharing scheme. In this paper we consider 272 non-isomorphic connected graph access structures with nine vertices and eight or nine edges, and either determine or bound the optimal information rate in each case. We obtain exact values for the optimal information rate for 231 cases and present a method that is able to derive information-theoretical upper bounds on the optimal information rate. Moreover, we apply some of the constructions to determine lower bounds on the information rate. Regarding information rate, we conclude with a full listing of the known optimal information rate (or bounds on the optimal information rate) for all 272 graphs access structures of nine participants.
Similar content being viewed by others
References
Shamir A. How to share a secret. Communications of the ACM, 1979, 24: 612–613
Blakley G R. Safeguarding cryptographic keys. Proceedings of AFIPS National Computer Conference. 1979, 48: 313–317
Yuan H D. Secret sharing with multi-cover adaptive steganography. Information Sciences, 2014, 254(1): 197–212
Chen C C, Wu W J. A secure Boolean-based multi-secret image sharing scheme. Journal of Systems and Software, 2014, 92(7): 107–114
Ulutas G, Ulutas M, Nabiyev V V. Secret image sharing scheme with adaptive authentication strength. Pattern Recognition Letters, 2013, 34(3): 283–291
Lein H, Miao F Y. Multilevel threshold secret sharing based on the Chinese Remainder Theorem. Information Processing Letters, 2014, 114(9): 504–509
Brickell E F, Stinson D R. Some improved bounds on the information rate of perfect secret sharing schemes. Journal of Cryptology, 1992, 5(3): 153–166
Lu H C, Fu H L. New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access tructures. Information Sciences, 2013, 240(10): 83–94
Jackson W, Martin K M. Perfect secret sharing schemes on five participants. Designs, Codes and Cryptography, 1996, 9(3): 267–286
van Dijk M. On the information rate of perfect secret sharing schemes. Designs, Codes and Cryptography, 1995, 6(2): 143–169
Song Y, Li ZH, Wang WC. The information rate of secret sharing schemes based on seven participants by connect graphs. Lecture Notes in Electrical Engineering, 2012, 127: 637–645
Wang W C, Li Z H, Song Y. The optional information rate of perfect secret sharing schemes. In: Proceedings of the 2011 International Conference on Business Management and Electronic Information. 2011, 207–212
Sun H M, Chen B L. Weighted decomposition construction for perfect secret sharing schemes. Computers & Mathematics with Applications, 2002, 43(6): 877–887
Gharahi M, Dehkordi M H. The complexity of the graph access structures on six participants. Designs, Codes and Cryptography, 2013, 67(2): 169–173
Padríő C, Víćzquez L. Finding lower bounds on the complexity of secret sharing schemes by linear prog ramming. Lecture Notes in Computer Science, 2010, 6034: 344–355
Capocelli R M, De Santis A, Gargano L, Vaccaro U. On the size of shares of secret sharing schemes. Journal of Cryptology, 1993, 6(3): 157–168
Cover T M, Thomas J A. Elements of Information Theory. 2nd ed. Wiley: New York, 2006
Stinson D R. Cryptography theory and practice. 3rd ed. CRC/C&H, 2009
Author information
Authors and Affiliations
Corresponding author
Additional information
Yun Song received her MS in cryptography from Shaanxi Normal University, China in 2012. She is currently a PhD candidate in cryptography at Shaanxi Normal University. Her research interests lie in information security and quantum secret sharing.
Zhihui Li received her PhD in computer software and theory from Northwestern Polytechnical University, China. She is currently a professor in the College of Mathematics and Information Science at Shaanxi Normal University in China. She has published more than 60 academic papers in international conferences and journals. Her research interests are in the areas of information security, coding theory and quantum information.
Yongming Li received his PhD from Sichuan University. He is currently a professor in the College of Computer Science at Shaanxi Normal University, China. His research interests are in the areas of computational intelligence, quantum logic, quantum computation and quantum information. Dr. Li has published over 200 technical papers in international journals and conference proceedings. He has served as a reviewer to numerous international journals, and as a committee member to many conferences and review panels.
Ren Xin received his PhD from Xi’an University of Architecture and Technology, China in 2012. He got a postdoctoral position in Beijing University of Technology in 2014. He is currently a lecturer in the School of Civil Engineering at Xi’an University of Architecture and Technology in China. His research interests are in the areas of computer graphics, numerical analysis of finite elements and engineering structure reliability theory.
Rights and permissions
About this article
Cite this article
Song, Y., Li, Z., Li, Y. et al. The optimal information rate for graph access structures of nine participants. Front. Comput. Sci. 9, 778–787 (2015). https://doi.org/10.1007/s11704-015-3255-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11704-015-3255-6