On Ideal Secret-Sharing Schemes for k-homogeneous access structures

09/14/2023
by   Younjin Kim, et al.
0

A k-uniform hypergraph is a hypergraph where each k-hyperedge has exactly k vertices. A k-homogeneous access structure is represented by a k-uniform hypergraph ℋ, in which the participants correspond to the vertices of hypergraph ℋ. A set of vertices can reconstruct the secret value from their shares if they are connected by a k-hyperedge, while a set of non-adjacent vertices does not obtain any information about the secret. One parameter for measuring the efficiency of a secret sharing scheme is the information rate, defined as the ratio between the length of the secret and the maximum length of the shares given to the participants. Secret sharing schemes with an information rate equal to one are called ideal secret sharing schemes. An access structure is considered ideal if an ideal secret sharing scheme can realize it. Characterizing ideal access structures is one of the important problems in secret sharing schemes. The characterization of ideal access structures has been studied by many authors <cit.>. In this paper, we characterize ideal k-homogeneous access structures using the independent sequence method. In particular, we prove that the reduced access structure of Γ is an (k, n)-threshold access structure when the optimal information rate of Γ is larger than k-1/k, where Γ is a k-homogeneous access structure satisfying specific criteria.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/09/2020

Access Structures Determined by Uniform Polymatroids

A secret sharing scheme is a method of sharing a secret key among a fini...
research
03/08/2021

Bipartite secret sharing and staircases

Bipartite secret sharing schemes have a bipartite access structure in wh...
research
09/10/2019

Crucial and Redundant Shares and Compartments in Secret Sharing

Secret sharing is the well-known problem of splitting a secret into mult...
research
03/27/2020

An ideal hierarchical secret sharing scheme

One of the methods used in order to protect a secret K is a secret shari...
research
06/27/2019

Smallest graphs achieving the Stinson bound

Perfect secret sharing scheme is a method of distribute a secret informa...
research
09/30/2019

Secret sharing and duality

Secret sharing is an important building block in cryptography. All expli...

Please sign up or login with your details

Forgot password? Click here to reset