Information and Media Technologies
Online ISSN : 1881-0896
ISSN-L : 1881-0896
Computing
New Construction Methods of Secret Sharing Schemes Based on Authorized Subsets
Kouya Tochikubo
Author information
JOURNAL FREE ACCESS

2013 Volume 8 Issue 4 Pages 978-986

Details
Abstract

We propose new construction methods of secret sharing schemes realizing general access structures. Our proposed construction methods are perfect secret sharing schemes and include Shamir's (k, n)-threshold schemes as a special case. Furthermore, except for some access structures for which the efficiency is the same as the previous ones, the proposed construction methods are more efficient than Benaloh and Leichter's scheme and the scheme I of TUM05.

Content from these authors
© 2013 Information Processing Society of Japan
Previous article Next article
feedback
Top