On the information rate of perfect secret sharing schemes

From MaRDI portal
Publication:1894277

DOI10.1007/BF01398012zbMath0829.94006OpenAlexW2160940849MaRDI QIDQ1894277

Marten van Dijk

Publication date: 24 July 1995

Published in: Designs, Codes and Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/bf01398012




Related Items (43)

More information theoretical inequalities to be used in secret sharing?Secret-sharing schemes for very dense graphsOn secret sharing schemesAn asymptotically perfect secret sharing scheme based on the Chinese Remainder TheoremOptimal linear secret sharing schemes for graph access structures on six participantsSecret sharing on large girth graphsImproved constructions of secret sharing schemes by applying \((\lambda ,\omega )\)-decompositionsImproving the linear programming technique in the search for lower bounds in secret sharingOn an infinite family of graphs with information ratio \(2 - 1/k\)Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structuresSecret sharing schemes for graph-based prohibited structuresThe optimal average information ratio of secret-sharing schemes for the access structures based on unicycle graphs and bipartite graphsSharing one secret vs. sharing many secrets.The complexity of the graph access structures on six participantsFinding lower bounds on the complexity of secret sharing schemes by linear programmingSecret sharing on regular bipartite access structuresRecursive constructions for perfect secret sharing schemesCommon information, matroid representation, and secret sharing for matroid portsOn Linear Secret Sharing for Connectivity in Directed GraphsOptimal information ratio of secret sharing schemes on Dutch windmill graphsOn-line secret sharingThe lower bound and exact value of the information rate of some developed graph access structuresOn the information ratio of graphs without high-degree neighborsExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationOn group-characterizability of homomorphic secret sharing schemesSecret-Sharing Schemes: A SurveyFully dynamic secret sharing schemesNew bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structuresLower bounds for monotone span programsExact information ratios for secret sharing on small graphs with girth at least 5Optimal assignment schemes for general access structures based on linear programmingSecret sharing on the \(d\)-dimensional cubeSharing multiple secrets: Models, schemes and analysisOptimal complexity of secret sharing schemes with four minimal qualified subsetsReduced access structures with four minimal qualified subsets on six participantsThe exact values of the optimal average information ratio of perfect secret-sharing schemes for tree-based access structuresSecret Sharing Schemes for Dense Forbidden GraphsHypergraph decomposition and secret sharingOn the optimization of bipartite secret sharing schemesAn impossibility result on graph secret sharingA New Approach to Image Sharing with High-Security Threshold StructureON THE DEALER'S RANDOMNESS REQUIRED IN PERFECT SECRET SHARING SCHEMES WITH ACCESS STRUCTURES OF CONSTANT RANKWeighted decomposition construction for perfect secret sharing schemes



Cites Work


This page was built for publication: On the information rate of perfect secret sharing schemes