Covering and secret sharing with linear codes

101Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Secret sharing has been a subject of study for over twenty years, and has had a number of real-world applications. There are several approaches to the construction of secret sharing schemes. One of them is based on coding theory. In principle, every linear code can be used to construct secret sharing schemes. But determining the access structure is very hard as this requires the complete characterisation of the minimal codewords of the underlying linear code, which is a difficult problem. In this paper we present a sufficient condition under which we are able to determine all the minimal codewords of certain linear codes. The condition is derived using exponential sums. We then construct some linear codes whose covering structure can be determined, and use them to construct secret sharing schemes with interesting access structures. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Ding, C., & Yuan, J. (2003). Covering and secret sharing with linear codes. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2731, 11–25. https://doi.org/10.1007/3-540-45066-1_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free