Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
On proper secrets, \((t,k)\)-bases and linear codes - MaRDI portal

On proper secrets, \((t,k)\)-bases and linear codes (Q735016)

From MaRDI portal





scientific article; zbMATH DE number 5614968
Language Label Description Also known as
English
On proper secrets, \((t,k)\)-bases and linear codes
scientific article; zbMATH DE number 5614968

    Statements

    On proper secrets, \((t,k)\)-bases and linear codes (English)
    0 references
    0 references
    0 references
    14 October 2009
    0 references
    The authors introduce the concept of \textit{proper secret} in Shamir's \((k, n)\) threshold scheme. In this scheme the secret and the shares are elements of \(\mathbb{F}_q ,\) where \(q>n.\) They prove, that all values of the secret generating polynomial are proper secrets, but not all linear combinations of coefficients of this polynomial serve as a secret. They also study \((t,k)\) spanning sets, independent sets, bases (which are generalizations of the usual concepts). and the relations between them. It is shown that \((t,k)\)-bases over \(\mathbb{F}_q\) may have different sizes, lower and upper bounds are derived for these sizes. Finally the notions, introduced here are compared with some well-known projective geometric objects.
    0 references
    threshold secret sharing
    0 references
    linear independence
    0 references
    spanning set
    0 references
    bases
    0 references
    linear codes
    0 references
    projective geometry
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references