Abstract
In a compartmented access structure, there are disjoint participants C 1,ā¦,C m . The access structure consists of subsets of participants containing at least t i from C i for iā=ā1,ā¦,m, and a total of at least t 0 participants. Tassa [2] asked: whether there exists an efficient ideal secret sharing scheme for such an access structure? Tassa and Dyn [5] realized this access structure with the help of its dual access structure. Unlike the scheme constructed in [5], we propose a direct solution here, in the sense that it does not utilize the dual access structure. So our method is compact and simple.
This work was partially supported by Natural Science Foundation of China under grant (60970134) and Innovation Foundation of Institute of Software under grant (ISCAS2009-QY04).
Chapter PDF
Similar content being viewed by others
References
Shamir, A.: How to share a secret. Commun. ACMĀ 22, 612ā613 (1979)
Tassa, T.: Hierarchical threshold secret sharing. J. CryptologyĀ 20, 237ā264 (2007)
Simmons, G.J.: How to (Really) Share a Secret. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.Ā 403, pp. 390ā448. Springer, Heidelberg (1990)
Brickell, E.F.: Some ideal secret sharing schemes. Journal of Combinatorial Mathematics and Combinatorial ComputingĀ 6, 105ā113 (1989)
Tassa, T., Dyn, N.: Multipartite secret sharing by bivarite interpolation. J. CryptologyĀ 22, 227ā258 (2009)
Blakley, G.R.: Safeguarding cryptographic keys. In: Proc. AFIPS 1979 NCC, Arlington, Va, vol.Ā 48, pp. 313ā317 (June 1979)
Herranz, J., SĆ”ez, G.: New results on multipartite access structures. IEE Proc. Inf. Secur.Ā 153, 153ā162 (2006)
Fehr, S.: Efficient construction of the dual span program (May 1999) (manuscript)
Karchmer, M., Wigderson, A.: On Span Programs. In: The Eighth Annual Structure in Complexity Theory, pp. 102ā111 (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yu, Y., Wang, M. (2011). A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds) Information and Communications Security. ICICS 2011. Lecture Notes in Computer Science, vol 7043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25243-3_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-25243-3_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25242-6
Online ISBN: 978-3-642-25243-3
eBook Packages: Computer ScienceComputer Science (R0)