Graph decompositions and secret sharing schemes

  • Authors:
  • C. Blundo;A. De Santis;D. R. Stinson;U. Vaccaro

  • Affiliations:
  • Dipartirnento di Informatica, Università di Salerno, Baronissi, SA, Italy;Dipartirnento di Informatica, Università di Salerno, Baronissi, SA, Italy;Computer Science and Engineering Department and Center for Communication and Information Science, University of Nebraska, Lincoln, NE;Dipartirnento di Informatica, Università di Salerno, Baronissi, SA, Italy

  • Venue:
  • EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
  • Year:
  • 1992

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we continue a study of secret sharing schemes for access structures based on graphs. Given a graph G, we require that a subset of participants can compute a secret key if they contain an edge of G otherwise, they can obtain no information regarding the key. We study the information rate of such schemes, which measures how much information is being distributed as shares as compared to the size of the secret key, and the average information rate, which is the ratio between the secret size and the arithmetic mean of the size of the shares. We give both upper and lower bounds on the optimal information rate and average information rate that can be obtained. Upper bounds arise by applying entropy arguments due to Capocelli et al [10]. Lower bounds come from constructions that are based on graph decompositions. Application of these constructions requires solving a particular linear programming problem. We prove some general results concerning the information rate and average information rate for paths, cycles and trees. Also, we study the 30 (connected) graphs on at most five vertices, obtaining exact values for the optimal information rate in 26 of the 30 cases, and for the optimal avebage information rate in 28 of the 30 cases.