Designs and their codes
Communications of the ACM
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
On sharing secrets and Reed-Solomon codes
Communications of the ACM
Communications of the ACM
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Secret Sharing Schemes with Nice Access Structures
Fundamenta Informaticae - SPECIAL ISSUE ON TRAJECTORIES OF LANGUAGE THEORY Dedicated to the memory of Alexandru Mateescu
Covering and secret sharing with linear codes
DMTCS'03 Proceedings of the 4th international conference on Discrete mathematics and theoretical computer science
Secret sharing schemes from binary linear codes
Information Sciences: an International Journal
Proceedings of the 4th international conference on Security of information and networks
Secret Sharing Schemes with Nice Access Structures
Fundamenta Informaticae - SPECIAL ISSUE ON TRAJECTORIES OF LANGUAGE THEORY Dedicated to the memory of Alexandru Mateescu
Hi-index | 0.00 |
Previous researchers have designedshared control schemes with a view to minimising the likelihoodthat participants will conspire to perform an unauthorised act.But, human nature being what it is, systems inevitably fail;so shared control schemes should also be designed so that thepolice can identify conspirators after the fact. This requirementleads us to search for schemes with sparse access structures.We show how this can be done using ideas from coding theory.In particular, secret sharing schemes based on geometric codeswhose dual [n,k,d] codes have d andn as their only nonzero weights are suitable. Wedetermine their access structures and analyse their properties.We have found almost all of them, and established some relationsamong codes, designs and secret-sharing schemes.