A secret sharing scheme is a method of distributing a secret among a group of participants in such a way that only certain subgroups are authorized to know the secret. Secret sharing schemes have been used in many areas of cryptography such as secure information storage, threshold cryptographic protocols, secure message transmission, secure multiparty computation, and generalized oblivious transfer. This thesis deals with secret sharing schemes constructed using linear codes. First, we consider the secret sharing schemes based on linear codes constructed using the approach by Karnin, Greene and Hellman, by Bertilsson and Ingemarsson and by Massey. In this approach, the minimal authorized groups correspond to certain minimal codewords of th...
In this thesis, we explain linear secret sharing schemes, in particular multiplicative threshold lin...
Secret sharing is an important building block in cryptography. All explicit secret sharing schemes w...
A secret-sharing scheme realizes the forbidden graph access structure determined by a graph $G=(V,E)...
Secret sharing schemes have been studied for over twenty years. An important ap-proach to the constr...
In this paper, binary linear codes are used to construct the access structures of a secret sharing s...
The study of secret sharing schemes was independently initiated by Shamir and Blakely in 1979. Since...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Secret sharing schemes, introduced by Blakley and Shamir independently in 1979, have a number of app...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
In this paper, we generalize the vector space construction due to Brickell [5]. This generalization,...
Optimizing the maximum, or average, length of the shares in relation to the length of the secret for...
In this paper,, error-correcting codes from perfect nonlinear mappings are constructed, and then emp...
Secret sharing has been a subject of study since 1979. In the secret sharing schemes there are some ...
A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some ...
In this thesis, we explain linear secret sharing schemes, in particular multiplicative threshold lin...
Secret sharing is an important building block in cryptography. All explicit secret sharing schemes w...
A secret-sharing scheme realizes the forbidden graph access structure determined by a graph $G=(V,E)...
Secret sharing schemes have been studied for over twenty years. An important ap-proach to the constr...
In this paper, binary linear codes are used to construct the access structures of a secret sharing s...
The study of secret sharing schemes was independently initiated by Shamir and Blakely in 1979. Since...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Secret sharing schemes, introduced by Blakley and Shamir independently in 1979, have a number of app...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
In this paper, we generalize the vector space construction due to Brickell [5]. This generalization,...
Optimizing the maximum, or average, length of the shares in relation to the length of the secret for...
In this paper,, error-correcting codes from perfect nonlinear mappings are constructed, and then emp...
Secret sharing has been a subject of study since 1979. In the secret sharing schemes there are some ...
A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some ...
In this thesis, we explain linear secret sharing schemes, in particular multiplicative threshold lin...
Secret sharing is an important building block in cryptography. All explicit secret sharing schemes w...
A secret-sharing scheme realizes the forbidden graph access structure determined by a graph $G=(V,E)...