Some improved bounds on the information rate of perfect secret sharing schemes

Informally, a secret sharing scheme is a method of sharing a secret key K among a finite set of participants, in such a way that certain specified subsets of participants can compute a key. Suppose that P is the set of participants. Denote by Γ the set of subsets of participants which we desire to be able to determine the key; hence Γ ⊑ 2P. Γ is called the access structure of the secret sharing scheme. It seems reasonable to require that Γ be monotone, i.e. $$ ifB \in \Gamma andB \subseteq C \subseteq P,thenC \in \Gamma . $$ For any Γ0 ⊑ 2P, define the cioswe of Γ0 to be $$ cl\left( {\Gamma _0 } \right) = \left\{ {C:B \in \Gamma andB \subseteq C \subseteq P} \right\}. $$ Note that the closure of any set of subsets is monotone.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Hanfried Lenz,et al.  Design theory , 1985 .

[3]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[4]  Douglas R. Stinson,et al.  Recent results on combinatorial constructions for threshold schemes , 1990, Australas. J Comb..

[5]  Douglas R. Stinson,et al.  A Combinatorial Approach to Threshold Schemes , 1987, SIAM J. Discret. Math..

[6]  Ernest F. Brickell,et al.  Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.

[7]  Alfredo De Santis,et al.  On the Size of Shares for Secret Sharing Schemes , 1991, CRYPTO.

[8]  Mitsuru Ito,et al.  Secret sharing scheme realizing general access structure , 1989 .

[9]  Josh Benaloh,et al.  Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.