Secret Sharing Schemes Based on Linear Codes Can Be Precisely Characterized by the Relative Generalized Hamming Weight

Author(s):  
Jun KURIHARA ◽  
Tomohiko UYEMATSU ◽  
Ryutaroh MATSUMOTO
2016 ◽  
Vol 27 (05) ◽  
pp. 595-605 ◽  
Author(s):  
Xianfang Wang ◽  
Jian Gao ◽  
Fang-Wei Fu

In principle, every linear code can be used to construct a secret sharing scheme. However, determining the access structure of the scheme is a very difficult problem. In this paper, we study MacDonald codes over the finite non-chain ring [Formula: see text], where p is a prime and [Formula: see text]. We provide a method to construct a class of two-weight linear codes over the ring. Then, we determine the access structure of secret sharing schemes based on these codes.


2019 ◽  
Vol 12 (02) ◽  
pp. 1950026
Author(s):  
Sassia Makhlouf ◽  
Lemnouar Noui

Recently, several authors used linear codes to construct secret sharing schemes. It is known that if each nonzero codeword of a code [Formula: see text] is minimal, then the dual code [Formula: see text] is suitable for secret sharing. To seek such codes Ashikhmin–Barg give a sufficient condition from weights; in [Formula: see text] code [Formula: see text], let [Formula: see text] and [Formula: see text] be the minimum and maximum nonzero weights, respectively. If [Formula: see text] then all nonzero codewords of [Formula: see text] are minimal. In this paper, a necessary and sufficient condition is given for self-dual codes and for MDS codes to verify the inequality (*). Special codes are examined and applied for secret sharing schemes.


2020 ◽  
Vol 15 (1) ◽  
pp. 157-173
Author(s):  
Laszlo Csirmaz

AbstractSecret sharing is an important building block in cryptography. All explicit secret sharing schemes which are known to have optimal complexity are multi-linear, thus are closely related to linear codes. The dual of such a linear scheme, in the sense of duality of linear codes, gives another scheme for the dual access structure. These schemes have the same complexity, namely the largest share size relative to the secret size is the same. It is a long-standing open problem whether this fact is true in general: the complexity of any access structure is the same as the complexity of its dual. We give a partial answer to this question. An almost perfect scheme allows negligible errors, both in the recovery and in the independence. There exists an almost perfect ideal scheme on 174 participants whose complexity is strictly smaller than that of its dual.


2021 ◽  
Vol 30 (5) ◽  
pp. 895-901
Author(s):  
WANG Yaru ◽  
LI Fulin ◽  
ZHU Shixin

Sign in / Sign up

Export Citation Format

Share Document