A secret-sharing scheme realizes a graph if every two vertices connected by an edge can reconstruct the secret while every independent set in the graph does not get any information on the secret. Similar to secret-sharing schemes for general access structures, there are gaps between the known lower bounds and upper bounds on the share size for graphs. Motivated by the question of what makes a graph ``hard\u27\u27 for secret-sharing schemes (that is, require large shares), we study very dense graphs, that is, graphs whose complement contains few edges. We show that if a graph with $n$ vertices contains $\binom{n}{2}-n^{1+\beta}$ edges for some constant $0\leq\beta <1$, then there is a scheme realizing the graph with total share size of $\t...
The purpose of this paper is to decribe a very powerful decomposition construction for perfect secre...
A $k$-uniform hypergraph is a hypergraph where each $k$-hyperedge has exactly $k$ vertices. A $k$-ho...
AbstractIn this paper, we propose an efficient construction of perfect secret sharing schemes for gr...
A secret-sharing scheme realizes a graph if every two vertices connected by an edge can reconstruct ...
A secret-sharing scheme realizes the forbidden graph access structure determined by a graph $G=(V,E)...
The share size of general secret-sharing schemes is poorly understood. The gap between the best know...
AbstractWe derive new limitations on the information rate and the average information rate of secret...
Optimizing the maximum, or average, length of the shares in relation to the length of the secret for...
We extend the notion of perfect secret sharing scheme for access structures with infinitely many par...
We review the problem of finding the optimal information ratios of graph access structures on six pa...
We derive new limitations on the information rate and the average information rate of secret sharing...
In this paper, we continue a study of secret sharing schemes for access structures based on graphs. ...
AbstractIn this paper we study anonymous secret sharing schemes. Informally, in an anonymous secret ...
AbstractA secret sharing scheme is a protocol by which a dealer distributes a secret among a set of ...
[[abstract]]A secret sharing scheme is a method which allows a secret to be shared among a finite se...
The purpose of this paper is to decribe a very powerful decomposition construction for perfect secre...
A $k$-uniform hypergraph is a hypergraph where each $k$-hyperedge has exactly $k$ vertices. A $k$-ho...
AbstractIn this paper, we propose an efficient construction of perfect secret sharing schemes for gr...
A secret-sharing scheme realizes a graph if every two vertices connected by an edge can reconstruct ...
A secret-sharing scheme realizes the forbidden graph access structure determined by a graph $G=(V,E)...
The share size of general secret-sharing schemes is poorly understood. The gap between the best know...
AbstractWe derive new limitations on the information rate and the average information rate of secret...
Optimizing the maximum, or average, length of the shares in relation to the length of the secret for...
We extend the notion of perfect secret sharing scheme for access structures with infinitely many par...
We review the problem of finding the optimal information ratios of graph access structures on six pa...
We derive new limitations on the information rate and the average information rate of secret sharing...
In this paper, we continue a study of secret sharing schemes for access structures based on graphs. ...
AbstractIn this paper we study anonymous secret sharing schemes. Informally, in an anonymous secret ...
AbstractA secret sharing scheme is a protocol by which a dealer distributes a secret among a set of ...
[[abstract]]A secret sharing scheme is a method which allows a secret to be shared among a finite se...
The purpose of this paper is to decribe a very powerful decomposition construction for perfect secre...
A $k$-uniform hypergraph is a hypergraph where each $k$-hyperedge has exactly $k$ vertices. A $k$-ho...
AbstractIn this paper, we propose an efficient construction of perfect secret sharing schemes for gr...