Design theory
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
A combinatorial approach to threshold schemes
SIAM Journal on Discrete Mathematics
A time-randomness tradeoff for oblivious routing
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Generalized secret sharing and monotone functions
CRYPTO '88 Proceedings on Advances in cryptology
A completion of Lu's determination of the spectrum of large sets of disjoint Steiner Triple systems
Journal of Combinatorial Theory Series A
Elements of information theory
Elements of information theory
Some improved bounds on the information rate of perfect secret sharing schemes
Journal of Cryptology
Strongly ideal secret sharing schemes
Journal of Cryptology
Combinatorial designs and cryptography
Surveys in combinatorics, 1993
An explication of secret sharing schemes
Designs, Codes and Cryptography
Some new 2-resolvable Steiner quadruple systems
Designs, Codes and Cryptography
On the information rate of secret sharing schemes
Theoretical Computer Science
On the Dealer‘s Randomness Required in Secret Sharing Schemes
Designs, Codes and Cryptography
Communications of the ACM
Randomness in Distributed Protocols
ICALP '94 Proceedings of the 21st International Colloquium on Automata, Languages and Programming
New General Lower Bounds on the Information Rate of Secret Sharing Schemes
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
On the Dealer‘s Randomness Required in Secret Sharing Schemes
Designs, Codes and Cryptography
Randomness vs. fault-tolerance
PODC '97 Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing
Amortizing randomness in private multiparty computations
PODC '98 Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing
Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
On automatic secret generation and sharing for Karin-Greene-Hellman scheme
Artificial intelligence and security in computing systems
On partial anonymity in secret sharing
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Hi-index | 0.00 |
In this paper we provide upper and lower bounds on the randomness requiredby the dealer to set up a secret sharing scheme for infinite classes ofaccess structures. Lower bounds are obtained using entropy arguments. Upperbounds derive from a decomposition construction based on combinatorialdesigns (in particular,t-(v,k,λ) designs). We prove a general result on therandomness needed to construct a scheme for the cycle Cn; whenn is odd our bound is tight. We study the access structures onat most four participants and the connected graphs on five vertices,obtaining exact values for the randomness for all them. Also, we analyze thenumber of random bits required to construct anonymous threshold schemes,giving upper bounds. (Informally, anonymous threshold schemes are schemes inwhich the secret can be reconstructed without knowledge of which participantshold which shares.)