A secret-sharing scheme realizes the forbidden graph access structure determined by a graph $G=(V,E)$ if the parties are the vertices of the graph and the subsets that can reconstruct the secret are the pairs of vertices in $E$ (i.e., the edges) and the subsets of at least three vertices. Secret-sharing schemes for forbidden graph access structures defined by bipartite graphs are equivalent to conditional disclosure of secrets protocols. We study the complexity of realizing a forbidden graph access structure by linear secret-sharing schemes. A secret-sharing scheme is linear if the secret can be reconstructed from the shares by a linear mapping. We provide efficient constructions and lower bounds on the share size of linear secret-sharing ...
A secret-sharing scheme allows to distribute a secret $s$ among $n$ parties such that only some pred...
summary:A secret sharing scheme is ideal if the size of each share is equal to the size of the secre...
Secret sharing refers to methods used to distribute a secret value among a set of participants. This...
A secret-sharing scheme realizes a graph if every two vertices connected by an edge can reconstruct ...
Optimizing the maximum, or average, length of the shares in relation to the length of the secret for...
A secret-sharing scheme realizes a graph if every two vertices connected by an edge can reconstruct ...
The share size of general secret-sharing schemes is poorly understood. The gap between the best know...
We present a new improvement in the linear programming technique to derive lower bounds on the infor...
We review the problem of finding the optimal information ratios of graph access structures on six pa...
Optimizing the ratio between the maximum length of the shares and the length of the secret value in ...
AbstractWe derive new limitations on the information rate and the average information rate of secret...
A secret sharing scheme is a method of distributing a secret among a group of participants in such a...
AbstractA secret sharing scheme for the prohibited structure is a method of sharing a master key amo...
A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some ...
The purpose of this paper is to decribe a very powerful decomposition construction for perfect secre...
A secret-sharing scheme allows to distribute a secret $s$ among $n$ parties such that only some pred...
summary:A secret sharing scheme is ideal if the size of each share is equal to the size of the secre...
Secret sharing refers to methods used to distribute a secret value among a set of participants. This...
A secret-sharing scheme realizes a graph if every two vertices connected by an edge can reconstruct ...
Optimizing the maximum, or average, length of the shares in relation to the length of the secret for...
A secret-sharing scheme realizes a graph if every two vertices connected by an edge can reconstruct ...
The share size of general secret-sharing schemes is poorly understood. The gap between the best know...
We present a new improvement in the linear programming technique to derive lower bounds on the infor...
We review the problem of finding the optimal information ratios of graph access structures on six pa...
Optimizing the ratio between the maximum length of the shares and the length of the secret value in ...
AbstractWe derive new limitations on the information rate and the average information rate of secret...
A secret sharing scheme is a method of distributing a secret among a group of participants in such a...
AbstractA secret sharing scheme for the prohibited structure is a method of sharing a master key amo...
A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some ...
The purpose of this paper is to decribe a very powerful decomposition construction for perfect secre...
A secret-sharing scheme allows to distribute a secret $s$ among $n$ parties such that only some pred...
summary:A secret sharing scheme is ideal if the size of each share is equal to the size of the secre...
Secret sharing refers to methods used to distribute a secret value among a set of participants. This...