Skip to main content

Cumulative arrays and geometric secret sharing schemes

  • Conference paper
  • First Online:
Advances in Cryptology — AUSCRYPT '92 (AUSCRYPT 1992)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 718))

Abstract

Cumulative secret sharing schemes were introduced by Simmons et al (1991) based on the generalised secret sharing scheme of Ito et al (1987). A given monotone access structure together with a security level is associated with a unique cumulative scheme. Geometric secret sharing schemes form a wide class of secret sharing schemes which have many desirable properties including good information rates. We show that every non-degenerate geometric secret sharing scheme is ‘contained’ in the corresponding cumulative scheme. As there is no known practical algorithm for constructing efficient secret sharing schemes, the significance of this result is that, at least theoretically, a geometric scheme can be constructed from the corresponding cumulative scheme.

This work was supported by the Science and Engineering Research Council Grant GR/G 03359

This work was supported by the Australian Research Council

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. G. R. Blakley: Safeguarding cryptographic keys. Proceedings of AFIPS 1979 National Computer Conference 48 (1979) 313–317

    Google Scholar 

  2. E. F. Brickell and D. M. Davenport: On the Classification of Ideal Secret Sharing Schemes. J. Cryptology 2 (1991) 123–124

    Google Scholar 

  3. E. F. Brickell and D. R. Stinson: Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes. To appear in J. Cryptology

    Google Scholar 

  4. J. W. P. Hirschfeld: Projective Geometries over Finite Fields. Clarendon Press, Oxford, 1979

    Google Scholar 

  5. M. Ito, A. Saito and T. Nishizeki: Secret Sharing Scheme Realizing General Access Structure. Proceedings IEEE Global Telecom. Conf., Globecom '87, IEEE Comm. Soc. Press (1987) 99–102

    Google Scholar 

  6. W.-A. Jackson and K. M. Martin: On Ideal Secret Sharing Schemes. Submitted to the J. Cryptology

    Google Scholar 

  7. W.-A. Jackson and 'K. M. Martin: Geometric Secret Sharing Schemes and their Duals. Submitted to Des. Codes Cryptogr.

    Google Scholar 

  8. K. M. Martin: New Secret Sharing Schemes from Old. Submitted to the J. Combin. Math. Combin. Comput.

    Google Scholar 

  9. A. Shamir: How to Share a Secret. Comm. ACM Vol 22 11 (1979) 612–613

    Google Scholar 

  10. G. J. Simmons: How to (Really) Share a Secret. Advances in Cryptology — CRYPTO'88, Lecture Notes in Comput. Sci. 403 (1990) 390–448

    Google Scholar 

  11. G. J. Simmons, W.-A. Jackson and K. Martin: The Geometry of Shared Secret Schemes. Bull. Inst. Combin. Appl. 1 (1991) 71–88

    Google Scholar 

  12. D. R. Stinson: An Explication of Secret Sharing Schemes. Preprint, 1992

    Google Scholar 

  13. D. R. Stinson: Private communication, 1992.

    Google Scholar 

  14. T. Uehara, T. Nishizeki, E. Okamoto and K. Nakamura: A Secret Sharing System with Matroidal Access Structure. Trans. IECE Japan J69-A 9 (1986) 1124–1132

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jennifer Seberry Yuliang Zheng

Rights and permissions

Reprints and permissions

Copyright information

© 1993 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jackson, WA., Martin, K.M. (1993). Cumulative arrays and geometric secret sharing schemes. In: Seberry, J., Zheng, Y. (eds) Advances in Cryptology — AUSCRYPT '92. AUSCRYPT 1992. Lecture Notes in Computer Science, vol 718. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57220-1_51

Download citation

  • DOI: https://doi.org/10.1007/3-540-57220-1_51

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-57220-6

  • Online ISBN: 978-3-540-47976-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics