An efficient construction of perfect secret sharing schemes for graph-based structures

Abstract In this paper, we propose an efficient construction of perfect secret sharing schemes for graph-based access structures where a vertex denotes a participant and an edge does a qualified pair of participants. The secret sharing scheme is based on the assumptions that the pairs of participants corresponding to edges in the graph can compute the master key but the pairs of participants corresponding to nonedges in the graph cannot. The information rate of our scheme is 1 (n − 1) , where n is the number of participants. We also present an application of our scheme to the reduction of storage and computation loads on the communication granting server in a secure network.

[1]  Josh Benaloh,et al.  Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.

[2]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[3]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[4]  Keith M. Martin,et al.  Multisecret Threshold Schemes , 1994, CRYPTO.

[5]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[6]  Richard W. Hamming,et al.  Coding and Information Theory , 1980 .

[7]  Mitsuru Ito,et al.  Secret sharing scheme realizing general access structure , 1989 .