This paper precisely characterizes secret sharing schemes based on arbitrary linear codes by using the relative dimension/length pro-file (RDLP) and the relative generalized Hamming weight (RGHW). We first describe the equivocation Δ of the secret vector s = [s , ⋯, s ] given m shares in terms of the RDLP of linear codes. We also characterize two thresholds t and t in the secret sharing schemes by the RGHW of linear codes. One shows that any set of at most t shares leaks no information about s, and the other shows that any set of at least t shares uniquely de-termines s. It is clarified that both characterizations for t and t are better than Chen et al.'s ones derived by the regular minimum Hamming weight. Moreover, this paper characterizes...
In this paper we try to shed a new insight on Verifiable Secret Sharing Schemes (VSS). We first defi...
Abstract. We introduce a linear code based on resilient maps on vector spaces over finite fields, we...
In this paper, binary linear codes are used to construct the access structures of a secret sharing s...
Secret sharing schemes have been studied for over twenty years. An important ap-proach to the constr...
The study of secret sharing schemes was independently initiated by Shamir and Blakely in 1979. Since...
Security of linear ramp secret sharing schemes can be characterized by the relative generalized Hamm...
A secret sharing scheme is a method of distributing a secret among a group of participants in such a...
In this paper, we generalize the vector space construction due to Brickell [5]. This generalization,...
Secret sharing schemes, introduced by Blakley and Shamir independently in 1979, have a number of app...
International audienceWe present a novel method for constructing linear secret sharing schemes (LSSS...
Asymptotically good sequences of linear ramp secret sharing schemes have been intensively studied by...
Abstract. We present a novel method for constructing linear secret sharing schemes (LSSS) from linea...
Secret sharing has been study for many years and has had a number of real-word applications. There a...
Secret sharing is an important building block in cryptography. All explicit secret sharing schemes w...
An n-player -secure robust secret sharing scheme is a (t,n)-threshold secret sharing scheme with the...
In this paper we try to shed a new insight on Verifiable Secret Sharing Schemes (VSS). We first defi...
Abstract. We introduce a linear code based on resilient maps on vector spaces over finite fields, we...
In this paper, binary linear codes are used to construct the access structures of a secret sharing s...
Secret sharing schemes have been studied for over twenty years. An important ap-proach to the constr...
The study of secret sharing schemes was independently initiated by Shamir and Blakely in 1979. Since...
Security of linear ramp secret sharing schemes can be characterized by the relative generalized Hamm...
A secret sharing scheme is a method of distributing a secret among a group of participants in such a...
In this paper, we generalize the vector space construction due to Brickell [5]. This generalization,...
Secret sharing schemes, introduced by Blakley and Shamir independently in 1979, have a number of app...
International audienceWe present a novel method for constructing linear secret sharing schemes (LSSS...
Asymptotically good sequences of linear ramp secret sharing schemes have been intensively studied by...
Abstract. We present a novel method for constructing linear secret sharing schemes (LSSS) from linea...
Secret sharing has been study for many years and has had a number of real-word applications. There a...
Secret sharing is an important building block in cryptography. All explicit secret sharing schemes w...
An n-player -secure robust secret sharing scheme is a (t,n)-threshold secret sharing scheme with the...
In this paper we try to shed a new insight on Verifiable Secret Sharing Schemes (VSS). We first defi...
Abstract. We introduce a linear code based on resilient maps on vector spaces over finite fields, we...
In this paper, binary linear codes are used to construct the access structures of a secret sharing s...