1995
DOI: 10.1007/bfb0053422
|View full text |Cite
|
Sign up to set email alerts
|

On the dealer's randomness required in secret sharing schemes

Abstract: Abstract. The problem we deal with in this paper is the research of upper and lower bounds on the randomness required by the dealer to set up a secret sharing scheme. We give both lower and upper bounds for infinite classes of access structures. Lower bounds are obtained using entropy arguments. Upper bounds derive from a decomposition construction based on combinatorial designs (in particular, t-(v, k, )~) designs). We prove a general result on the randomness needed to construct a scheme for the cycle C,~; wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

1998
1998
2013
2013

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…We can therefore assume |X| ≥ 2. We use the "independent sequence lemma" from [1], [8] that ensures f (X) ≥ |X| + 1.…”
Section: Information Complexity Of General Graphsmentioning
confidence: 99%
See 1 more Smart Citation
“…We can therefore assume |X| ≥ 2. We use the "independent sequence lemma" from [1], [8] that ensures f (X) ≥ |X| + 1.…”
Section: Information Complexity Of General Graphsmentioning
confidence: 99%
“…Definition 1. 1 We call a subset X of the vertices of a graph G a core of G if it induces a connected subgraph and one can find a neighbor x ′ / ∈ X of each x ∈ X such that x is the only neighbor of x ′ among the vertices in X and {x ′ | x ∈ X} is an independent set.…”
Section: Introductionmentioning
confidence: 99%
“…Considerable work has gone into trying to find bounds for the proposed efficiency measures for certain families of access structures, for example [19,23]. Since this process mainly using information theoretic techniques we do not discuss it in great depth in this paper (but see Section 4.3).…”
Section: Vol 79 2004mentioning
confidence: 99%
“…The other class of extended capabilities focuses on anonymity, randomness and automatization for secret sharing procedures. Anonymous and random secret sharing was studied by Blundo, Giorgio Gaggia, Stinson in [3], [4]. Some of ideas in automatic secret sharing and generation originate from the same field.…”
Section: Introductionmentioning
confidence: 99%