scispace - formally typeset
Open AccessBook ChapterDOI

Graph decompositions and secret sharing schemes

TLDR
This paper studies the information rate of secret sharing schemes for access structures based on graphs, which measures how much information is being distributed as shares as compared to the size of the secret key, and the average information rate, which is the ratio between the secret size and the arithmetic mean of the sizes of the shares.
Abstract
In this paper, we continue a study of secret sharing schemes for access structures based on graphs. Given a graph G, we require that a subset of participants can compute a secret key if they contain an edge of G otherwise, they can obtain no information regarding the key. We study the information rate of such schemes, which measures how much information is being distributed as shares as compared to the size of the secret key, and the average information rate, which is the ratio between the secret size and the arithmetic mean of the size of the shares. We give both upper and lower bounds on the optimal information rate and average information rate that can be obtained. Upper bounds arise by applying entropy arguments due to Capocelli et al [10]. Lower bounds come from constructions that are based on graph decompositions. Application of these constructions requires solving a particular linear programming problem. We prove some general results concerning the information rate and average information rate for paths, cycles and trees. Also, we study the 30 (connected) graphs on at most five vertices, obtaining exact values for the optimal information rate in 26 of the 30 cases, and for the optimal avebage information rate in 28 of the 30 cases.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

An explication of secret sharing schemes

TL;DR: This paper presents numerous direct constructions for secret sharing schemes, such as the Shamir threshold scheme, the Boolean circuit construction of Benaloh and Leichter, the vector space construction of Brickell, and the Simmons geometric construction, emphasizing combinatorial construction methods.
Journal ArticleDOI

On the size of shares for secret sharing schemes

TL;DR: This work shows that there are access structures with four participants for which any secret sharing scheme must give to a participant a share at least 50% greater than the secret size, the first proof that there exist access structures for which the best achievable information rate is bounded away from 1.
Journal ArticleDOI

Decomposition constructions for secret-sharing schemes

TL;DR: It is shown that for any graph G of maximum degree d, there is a perfect secret-sharing scheme for G with information rate 2/(d+1), as a corollary, the maximum information rate of secret- sharing schemes for paths on more than three vertices and for cycles on morethan four vertices is shown to be 2/3.
Journal ArticleDOI

On the information rate of perfect secret sharing schemes

TL;DR: A method to derive information-theoretical upper bounds on the optimal information rate and the optimal average information rate of perfect secret sharing schemes based on connected graphs on six vertices is discussed.
Book ChapterDOI

Size of shares and probability of cheating in threshold schemes

TL;DR: It is shown that any (k, n) threshold secret sharing algorithm in which any coalition of less than k participants has probability of successful cheating less than some ?
References
More filters
Book

Computers and Intractability: A Guide to the Theory of NP-Completeness

TL;DR: The second edition of a quarterly column as discussed by the authors provides a continuing update to the list of problems (NP-complete and harder) presented by M. R. Garey and myself in our book "Computers and Intractability: A Guide to the Theory of NP-Completeness,” W. H. Freeman & Co., San Francisco, 1979.
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Proceedings ArticleDOI

How to play ANY mental game

TL;DR: This work presents a polynomial-time algorithm that, given as a input the description of a game with incomplete information and any number of players, produces a protocol for playing the game that leaks no partial information, provided the majority of the players is honest.