Secret sharing schemes for (k, n)-consecutive access structures

2Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We consider access structures over a set P of n participants, defined by a parameter k with (Formula Presented) in the following way: A subset is authorized if it contains participants (Formula Presented), for some (Formula Presented). We call such access structures, which may naturally appear in real applications involving distributed cryptography, (k, n)-consecutive. We prove that these access structures are only ideal when (Formula Presented). Actually, we obtain the same result that has been obtained for other families of access structures: Being ideal is equivalent to being a vector space access structure and is equivalent to having an optimal information rate strictly bigger than 2/3. For the non-ideal cases, we give either the exact value of the optimal information rate, for k=n-2 and k=n-3, or some bounds on it.

Cite

CITATION STYLE

APA

Herranz, J., & Sáez, G. (2018). Secret sharing schemes for (k, n)-consecutive access structures. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11124 LNCS, pp. 463–480). Springer Verlag. https://doi.org/10.1007/978-3-030-00434-7_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free