Abstract
The paper deals with modular secret sharing schemes for certain non-threshold access structures. It is shown that based on compositions of ideal threshold modular schemes it is possible to build an ideal scheme for compartment access structures, as well as some of the more common structures, which were called composite.
Similar content being viewed by others
References
Shamir, A., How to share a secret, Comm. of the ACM, 1979, vol. 22, pp. 612–613.
Blakley, G., Safeguarding cryptographic keys, Proc. AFIPS Nat. Comp. Conf., New York, 1979, vol. 48, pp. 313–317.
Simmons, G.J., How to (really) share a secret, Adv. Cryptol., 1990, vol. 403, pp. 390–448.
Brickell, E.F., Some ideal secret sharing schemes, J. Comb. Math. Comb. Comput., 1989, pp. 105–113.
Biemel, A., Tassa, T., and Wienreb, E., Characterizing ideal weighted threshold secret sharing, Theory Cryptogr., 2005, vol. 3378, pp. 600–619.
Mignotte, M., How to share a secret, Adv. Cryptol., 1982, pp. 371–375.
Asmuth, C. and Bloom, J., A modular approach to key safeguarding, IEEE Trans. Inf. Theory, 1983, vol. 29, pp. 156–169.
Galibus, T. and Matveev, G., Mignotte’s sequences over polynomial rings, Electron. Notes Theor. Comput. Sci., 2007, vol. 186, pp. 41–46.
Galibus, T., Matveev, G., and Shenets, N., Some structural and security properties of the modular secret sharing, SYNASC'2008: 10th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, IEEE Comp. Soc., CPS, Los Alamitos, California, 2009, pp. 197–200.
Shenets, N.N., On the information rate of modular secret sharing schemes, Akad. Navuk Belarusi, Ser. Fiz.Mat. Navuk, 2010, vol. 54, no. 6, pp. 9–12.
Shenets, N.N., Modular sharing of the secret and the electronic voting system, Vestn. Belorus. Gos. Univ., Ser. 1, Fiz. Mat. Inf., 2011, no. 1, pp. 101–104.
STB (State Standard) 34.101.60: Information Technology and Security. Algorithms for Secret Sharing, Republic of Belarus, 2014.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © N.N. Shenets, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.
About this article
Cite this article
Shenets, N.N. Ideal composite modular secret sharing schemes. Aut. Control Comp. Sci. 49, 798–802 (2015). https://doi.org/10.3103/S0146411615080337
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411615080337