2024-03-28T19:58:42Zhttps://ipsj.ixsq.nii.ac.jp/ej/?action=repository_oaipmhoai:ipsj.ixsq.nii.ac.jp:000952132022-10-21T05:24:51Z00581:07002:07265
New Construction Methods of Secret Sharing Schemes Based on Authorized SubsetsNew Construction Methods of Secret Sharing Schemes Based on Authorized Subsetseng[特集:未来を切り開くコンピュータセキュリティ技術] (k, n)-threshold scheme, secret sharing scheme, general access structurehttp://id.nii.ac.jp/1001/00095194/Journal Articlehttps://ipsj.ixsq.nii.ac.jp/ej/?action=repository_action_common_download&item_id=95213&item_no=1&attribute_id=1&file_no=1Copyright (c) 2013 by the Information Processing Society of JapanDepartment of Mathematical Information Engineering, College of Industrial Technology, Nihon UniversityKouya, TochikuboWe propose new construction methods of secret sharing schemes realizing general access structures. Our proposed construction methods are perfect secret sharing schemes and include Shamir's (k, n)-threshold schemes as a special case. Furthermore, except for some access structures for which the efficiency is the same as the previous ones, the proposed construction methods are more efficient than Benaloh and Leichter's scheme and the scheme I of TUM05.------------------------------This is a preprint of an article intended for publication Journal ofInformation Processing(JIP). This preprint should not be cited. Thisarticle should be cited as: Journal of Information Processing Vol.21(2013) No.4 (online)DOI http://dx.doi.org/10.2197/ipsjjip.21.590------------------------------We propose new construction methods of secret sharing schemes realizing general access structures. Our proposed construction methods are perfect secret sharing schemes and include Shamir's (k, n)-threshold schemes as a special case. Furthermore, except for some access structures for which the efficiency is the same as the previous ones, the proposed construction methods are more efficient than Benaloh and Leichter's scheme and the scheme I of TUM05.------------------------------This is a preprint of an article intended for publication Journal ofInformation Processing(JIP). This preprint should not be cited. Thisarticle should be cited as: Journal of Information Processing Vol.21(2013) No.4 (online)DOI http://dx.doi.org/10.2197/ipsjjip.21.590------------------------------AN00116647情報処理学会論文誌5492013-09-151882-77642013-09-09