Izvestiya of Saratov University.

Mathematics. Mechanics. Informatics

ISSN 1816-9791 (Print)
ISSN 2541-9005 (Online)


For citation:

Ratseev S. M. Constructions of some secret sharing schemes based on linear codes. Izvestiya of Saratov University. Mathematics. Mechanics. Informatics, 2024, vol. 24, iss. 3, pp. 330-341. DOI: 10.18500/1816-9791-2024-24-3-330-341, EDN: FDXFXL

This is an open access article distributed under the terms of Creative Commons Attribution 4.0 International License (CC-BY 4.0).
Published online: 
30.08.2024
Full text:
(downloads: 117)
Language: 
Russian
Heading: 
Article type: 
Article
UDC: 
519.725
EDN: 
FDXFXL

Constructions of some secret sharing schemes based on linear codes

Autors: 
Ratseev Sergey Mihailovich, Ulyanovsk State University
Abstract: 

There are perfect and ideal threshold secret sharing schemes, for example, Shamir’s secret sharing  scheme. For the case of general secret sharing schemes with an arbitrary access structure, it is possible to construct a perfect scheme for any access structure (for example, the Ito – Saito – Nishizeki scheme, the Benaloh – Leichter scheme), but in general, such a scheme will not be an ideal secret sharing scheme. In the paper, for some classes of access structures, the construction of perfect and ideal secret sharing schemes based on linear codes is given. We also give a construction of perfect verifiable secret sharing schemes for any access structure for which there is a line code that implements this structure.

References: 
  1. McEliece R. J., Sarwate D. V. On sharing secrets and Reed – Solomon codes. Communications of the ACM, 1981, vol. 24, iss. 9, pp. 583–584. https://doi.org/10.1145/358746.358762
  2. Renvall A., Ding C. The access structure of some secret-sharing schemes. In: Pieprzyk J., Seberry J. (eds.) Information Security and Privacy. ACISP 1996. Lecture Notes in Computer Science, vol. 1172. Berlin, Heidelberg, Springer, 1996, pp. 67–78. https://doi.org/10.1007/BFb0023288
  3. Ding C., Laihonen T., Renvall A. Linear multisecret-sharing schemes and error-correcting codes. Journal of Universal Computer Science, 1997, vol. 3, iss. 9, pp. 1023–1036.
  4. Karnin E. D., Greene J. W., Hellman M. E. On secret sharing systems. IEEE Transactions on Information Theory, 1983, vol. 29, iss. 1, pp. 35–41. https://doi.org/10.1109/TIT.1983.1056621
  5. Pieprzyk J., Zhang X. M. Ideal threshold schemes from MDS codes. In: Lee P. J., Lim C. H. (eds.) Information Security and Cryptology — ICISC 2002. ICISC 2002. Lecture Notes in Computer Science, vol. 2587. Berlin, Heidelberg, Springer, 2003, pp. 253–263. https://doi.org/10.1007/3-540-36552-4_18
  6. Massey J. L. Minimal codewords and secret sharing. Proceedings of the 6th Joint Swedish-Russian Workshop on Information Theory. Molle, Sweden, 1993, pp. 276–279.
  7. Massey J. L. Some applications of coding theory in cryptography. In: Farrell P. G. (ed.) Codes and Ciphers: Cryptography and Coding IV. Essex, England, Formara Ltd., 1995, pp. 33–47.
  8. Tang C., Gao S., Zhang C. The optimal linear secret sharing scheme for any given access structure. Journal of Systems Science and Complexity, 2013, vol. 26, iss. 4, pp. 634–649. https://doi.org/10.1007/s11424-013-2131-4
  9. Cramer R., Damgard I. B., Dottling N., Fehr S., Spini G. Linear secret sharing schemes from error correcting codes and universal hash functions. In: Oswald E., Fischlin M. (eds.) Advances in Cryptology — EUROCRYPT 2015. Lecture Notes in Computer Science, vol. 9057. Berlin, Heidelberg, Springer, 2015, pp. 313–336. https://doi.org/10.1007/978-3-662-46803-6_11
  10. Tentu A. N., Paul P., Venkaiah V. Ch. Ideal and perfect hierarchical secret sharing schemes based on MDS codes. Proceeding of International Conference on Applied and Computational Mathematics. Ankara, Turkey, 2012, pp. 256–272.
  11. Ratseev S. M. Elementy vysshey algebry i teorii kodirovaniya [Elements of Higher Algebra and Coding Theory]. St. Petersburg, Lan’, 2022. 656 p. (in Russian). EDN: EPVGNW
  12. Ratseev S. M. Matematicheskie metody zashchity informatsii [Mathematical Methods of Information Security]. St. Petersburg, Lan’, 2022. 544 p. (in Russian). EDN: QZANSJ
Received: 
24.02.2023
Accepted: 
25.04.2023
Published: 
30.08.2024