Secret sharing is an important building block in cryptography. All explicit secret sharing schemes which are known to have optimal complexity are multi-linear, thus are closely related to linear codes. The dual of such a linear scheme, in the sense of duality of linear codes, gives another scheme for the dual access structure. These schemes have the same complexity, namely the largest share size relative to the secret size is the same. It is a long-standing open problem whether this fact is true in general: the complexity of any access structure is the same as the complexity of its dual. We give a partial answer to this question. An almost perfect scheme allows negligible errors, both in the recovery and in the independence. There exists an...
Bipartite secret sharing schemes have a bipartite access structure in which the set of participants ...
This paper precisely characterizes secret sharing schemes based on arbitrary linear codes by using t...
In this paper we try to shed a new insight on Verifiable Secret Sharing Schemes (VSS). We first defi...
Secret sharing schemes have been studied for over twenty years. An important ap-proach to the constr...
A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some ...
A secret sharing scheme is a method of distributing a secret among a group of participants in such a...
In this paper, we generalize the vector space construction due to Brickell [5]. This generalization,...
A secret sharing scheme permits a secret to be shared among participants in such a way that only qua...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
Secret sharing schemes, introduced by Blakley and Shamir independently in 1979, have a number of app...
Optimizing the maximum, or average, length of the shares in relation to the length of the secret for...
The study of secret sharing schemes was independently initiated by Shamir and Blakely in 1979. Since...
This electronic version was submitted by the student author. The certified thesis is available in th...
International audienceWe present a novel method for constructing linear secret sharing schemes (LSSS...
Bipartite secret sharing schemes have a bipartite access structure in which the set of participants ...
This paper precisely characterizes secret sharing schemes based on arbitrary linear codes by using t...
In this paper we try to shed a new insight on Verifiable Secret Sharing Schemes (VSS). We first defi...
Secret sharing schemes have been studied for over twenty years. An important ap-proach to the constr...
A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some ...
A secret sharing scheme is a method of distributing a secret among a group of participants in such a...
In this paper, we generalize the vector space construction due to Brickell [5]. This generalization,...
A secret sharing scheme permits a secret to be shared among participants in such a way that only qua...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
Secret sharing schemes, introduced by Blakley and Shamir independently in 1979, have a number of app...
Optimizing the maximum, or average, length of the shares in relation to the length of the secret for...
The study of secret sharing schemes was independently initiated by Shamir and Blakely in 1979. Since...
This electronic version was submitted by the student author. The certified thesis is available in th...
International audienceWe present a novel method for constructing linear secret sharing schemes (LSSS...
Bipartite secret sharing schemes have a bipartite access structure in which the set of participants ...
This paper precisely characterizes secret sharing schemes based on arbitrary linear codes by using t...
In this paper we try to shed a new insight on Verifiable Secret Sharing Schemes (VSS). We first defi...