A Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures

Reo Eriguchi, Noboru Kunihiro, Koji Nuida

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Secret sharing is a cryptographic technique to share a secret among participants in such a waythat only authorized subsets are able to recover the secret. Ramp secret sharing schemes can achieve better information ratio than perfect schemes while some partial information on a secret which iscomposed of several sub-secrets leaks out. The notion of strong security has been introduced to control the amount of information on every subset of the sub-secrets unauthorized sets can obtain. In this paper, we reduce the construction of strongly secure ramp secret sharing for general access structures to a linear algebraic problem. As a result, we show that previous results on strongly secure network coding imply two constructions of a linear transformation which makes a given linear ramp scheme strongly secure. They are explicit or provide a deterministic algorithm while the previousmethod which works for any linear ramp scheme is probabilistic.

Original languageEnglish
Title of host publicationProceedings of 2020 International Symposium on Information Theory and its Applications, ISITA 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages427-431
Number of pages5
ISBN (Electronic)9784885523304
Publication statusPublished - Oct 24 2020
Externally publishedYes
Event16th International Symposium on Information Theory and its Applications, ISITA 2020 - Virtual, Kapolei, United States
Duration: Oct 24 2020Oct 27 2020

Publication series

NameProceedings of 2020 International Symposium on Information Theory and its Applications, ISITA 2020

Conference

Conference16th International Symposium on Information Theory and its Applications, ISITA 2020
Country/TerritoryUnited States
CityVirtual, Kapolei
Period10/24/2010/27/20

All Science Journal Classification (ASJC) codes

  • Computational Theory and Mathematics
  • Computer Science Applications
  • Information Systems
  • Software
  • Theoretical Computer Science

Fingerprint

Dive into the research topics of 'A Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures'. Together they form a unique fingerprint.

Cite this