期刊文献+

A Novel Secret Sharing Scheme Based on Minimal Linear Codes

A Novel Secret Sharing Scheme Based on Minimal Linear Codes
原文传递
导出
摘要 In this paper, we propose a novel space efficient secret sharing scheme on the basis of minimal linear codes, which satisfies the definition of a computationally efficient secret sharing scheme. In the scheme, we partition the underlying minimal linear code into disjoint classes, establishing a one-to-one correspondence between the minimal authorized subsets of participants and the representative codewords of all different classes. Each participant, with only one short share transmitted through a public channel, can share a large secret. Therefore, the proposed scheme can distribute a large secret in practical applications such as secure information dispersal in sensor networks and secure multiparty computation. In this paper, we propose a novel space efficient secret sharing scheme on the basis of minimal linear codes, which satisfies the definition of a computationally efficient secret sharing scheme. In the scheme, we partition the underlying minimal linear code into disjoint classes, establishing a one-to-one correspondence between the minimal authorized subsets of participants and the representative codewords of all different classes. Each participant, with only one short share transmitted through a public channel, can share a large secret. Therefore, the proposed scheme can distribute a large secret in practical applications such as secure information dispersal in sensor networks and secure multiparty computation.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期407-412,共6页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation of China (11271237)
关键词 secret sharing scheme computationally efficient secret sharing minimal linear code access structure short share secret sharing scheme computationally efficient secret sharing minimal linear code access structure short share
  • 相关文献

参考文献1

二级参考文献12

  • 1Shamir A. How to share a secret. Communications of the ACM [J]. 1979,24(11):612- 613. 被引量:1
  • 2Blaldey G R. Safeguarding cryptographickeys[ A]. Proceedings of National Computer Conference [ C ]. Montvale, NJ: AF-IPS Press,New York: 1979.48:313 - 317. 被引量:1
  • 3Jin Y, Ding C S. Secret sharing schemes from three classes of linear codes[J] .IEEE Tram. Inform. Theory, 2006,52(1) :206 - 212. 被引量:1
  • 4Stinson D R. Ct3rptography Theory and Practice[M] .3rd ed, UnitedStates: 2009. 被引量:1
  • 5Massey J L. Minimal codewords and secret sharing [ A]. The 6th Joint Swedish-Russian Workshop on Infomaation Theory [ C] .Netherlands: Veldhoven, 1993.276 - 279. 被引量:1
  • 6Massey J L. Some Applications of Coding Theory in Cryptogra- phy [M] .Cryptography and Coding IV, England:Formara Ltd, 1995: 33 - 47. 被引量:1
  • 7Ding C S , Jin Y. Coveting and secret sharing with linear codes [ A] .Discrete Mathematics and Theoretical Computer Science: Lecture Notes in Computer Science[ C]. Berlin: Springer Ver- lag, 2003.2731 : 11 - 25. 被引量:1
  • 8Li Z H , Xue T, Lai H. Secret sharing schemes from binary linear codes[ J ]. Information Science, 2011,180 (22) : 4412 - 4419. 被引量:1
  • 9Ding C S. The weight dislribution of some irreducible cyclic codes[J], Trans Inform Theory, 2009, 55(3): 955 - 960. 被引量:1
  • 10Vega G, Wolfro_ann J. New classes of 2-weight cyclic codes [J]. Designs, Codes and Cryptography, 2007,42 (3) : 327 - 334. 被引量:1

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部