Secret sharing schemes for dense forbidden graphs

6Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A secret-sharing scheme realizes a given graph if every two vertices connected by an edge can reconstruct the secret and every independent set in the graph does not get any information about the secret. A secret-sharing scheme realizes a forbidden graph if every two vertices connected by an edge can reconstruct the secret and every two vertices which are not connected by an edge do not get any information about the secret. Similar to secret-sharing schemes for general access structures, there are gaps between the known lower bounds and upper bounds on the total share size for graphs and for forbidden graphs. Following [Beimel et al. CRYPTO 2012], our goal in this paper is to understand how the total share size increases by removing few edges from a graph that can be realized by an efficient secret-sharing scheme. We show that if a graph with n vertices contains at least (Formula Presented) edges for some (Formula Presented), i.e., it is obtained by removing few edges from the complete graph, then there is a scheme realizing its forbidden graph in which the total share size is O(n7/6+2β/3). This should be compared to O(n3/2), the best known upper bound for the total share size in general forbidden graphs. Additionally, we show that a forbidden graph access structure obtained by removing few edges from an arbitrary graph G can be realized by a secret-sharing scheme with total share size of O(m+ n7/6+2β/3), where m is the total size of the shares in a secretsharing scheme realizing G and n1+β is the number of the removed edges. We also show that for a graph obtained by removing few edges from an arbitrary graph G with n vertices, if the chromatic number of the graph that contains the removed edges is small, then there is a fairly efficient scheme realizing the resulting graph; specifically, we construct a secret-sharing scheme with total share size of Õ(m2/3n2/3+2β/3c1/3), where m is the total size of the shares in a secret-sharing scheme realizing G, the value n1+β is an upper bound on the number of the removed edges, and c is the chromatic number of the graph of the removed edges. This should be compared to O(n2/ log(n)), the best known upper bound for the total share size for general graphs.

Cite

CITATION STYLE

APA

Beimel, A., Farràs, O., & Peter, N. (2016). Secret sharing schemes for dense forbidden graphs. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9841 LNCS, pp. 509–528). Springer Verlag. https://doi.org/10.1007/978-3-319-44618-9_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free