Abstract
The problem of secret sharing schemes (555) in the case where all sharing functions are linear maps over a finite field is investigated. We evaluate the performance of linear secret sharing schemes using the tools of linear algebra and coding theory. In particular, the nonexistence of an ideal threshold linear 555 for the case where the number of participants is twice as large as the number of possible values of a secret is shown.
Preview
Unable to display preview. Download preview PDF.
References
MacWilliams, F.J., and Sloane, N.J.A., The theory of error-correcting codes, North-Holland Publishing Company, 1977.
Brickell E.F., ”Some ideal secret sharing schemes”, J. Combin. Math. and Combin. Comput., vol. 9, pp. 105–113, 1989.
Simmons G.J., ”An introduction to shared secret and/or shared control schemes and their applications”. In Contemporary Cryptology:the Science of Information Integrity, IEEE Press, N.Y., pp.441–497, 1992.
Blakley G.R., ”Safeguarding Cryptographic Keys”. In Proc. AFIPS 1979 Natl.Computer Conference, NY, vol. 48, pp. 313–317, 1979.
Shamir A., ”How to share a secret”, Communications of ACM, vol. 22, pp. 612–613, 1979.
McEliece R.J., Sarwate D.V.,”On secret sharing and Reed-Solomon codes”, Communications of ACM, vol. 24, pp. 583–584, 1981.
Massey J.L., ”Minimal codewords and secret sharing”. In Proc. Sixth Joint Swedish-Russian Workshop on Information theory, Molle, Sweden, pp. 276–279, 1993.
Bertillson M., ”Linear codes and secret sharing”. Linkoping Studies in Science and Technology. Dissertation, No.299, 1993.
Blakley G.R., Kabatianskii G.A., ”Linear algebra approach to secret sharing schemes”. In PreProceedings of Workshop on Information Protection, Moscow, 1993.
Capocelli R.M., De Santis A., Gargano L. and Vacaro U.”On the size of shares for secret sharing schemes”. In Lecture Notes in Computer Science, Springer-Verlag, v. 576, pp. 101–113, 1992.
Stinson D.R., ”An explication of secret sharing schemes”, Designs, Codes and Cryptography, vol. 2, pp. 357–390, 1992.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1994 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Blakley, G.R., Kabatianskii, G.A. (1994). Linear algebra approach to secret sharing schemes. In: Chmora, A., Wicker, S.B. (eds) Error Control, Cryptology, and Speech Compression. ECCSP 1993. Lecture Notes in Computer Science, vol 829. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-58265-7_5
Download citation
DOI: https://doi.org/10.1007/3-540-58265-7_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-58265-6
Online ISBN: 978-3-540-48588-9
eBook Packages: Springer Book Archive