We consider access structures over a set P of n participants, defined by a parameter k with (Formula Presented) in the following way: A subset is authorized if it contains participants (Formula Presented), for some (Formula Presented). We call such access structures, which may naturally appear in real applications involving distributed cryptography, (k, n)-consecutive. We prove that these access structures are only ideal when (Formula Presented). Actually, we obtain the same result that has been obtained for other families of access structures: Being ideal is equivalent to being a vector space access structure and is equivalent to having an optimal information rate strictly bigger than 2/3. For the non-ideal cases, we give either the exact value of the optimal information rate, for k=n-2 and k=n-3, or some bounds on it.
CITATION STYLE
Herranz, J., & Sáez, G. (2018). Secret sharing schemes for (k, n)-consecutive access structures. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11124 LNCS, pp. 463–480). Springer Verlag. https://doi.org/10.1007/978-3-030-00434-7_23
Mendeley helps you to discover research relevant for your work.