共查询到19条相似文献,搜索用时 108 毫秒
1.
2.
3.
4.
信息安全保密已成为当今信息时代的重要研究课题,因此秘密共享方案应运而生.在秘密共享方案中,利用LDPC码的编码实现秘密份额的分发,在LDPC码中,每一个非零码字都是极小码字,将秘密共享方案里的极小授权集与LDPC码的极小码字联系起来,通过极小授权集,实现秘密的重构.由于秘密份额在信道中传输会受到影响,所以恢复出来的秘密存在误码,所以利用一步大数逻辑译码纠错.实验表明,此方案实现了秘密分享,安全性高,又简单可行. 相似文献
5.
纠错码是提高信息传输效率与可靠性的重要手段.构造性能良好的线性码类是纠错码研究中的一个基本问题.本文主要讨论了有限非链环Fq[v]/(vm-v)上自对偶常循环码的代数结构,包括Euclidean自对偶常循环码、Hermitian自对偶常循环码以及Hermitian自对偶常循环码的极大距离可分(MDS)码.本文给出了环Fq[v]/(vm-v)上常循环码是Euclidean自对偶码的充分条件,以及是Hermitian自对偶码的充要条件,并利用Gray映射构造了有限域Fq上一些参数较好的自对偶码.特别地,本文得到了有限域F192上一个新的参数为[16,8,6]的Hermitian自对偶码. 相似文献
6.
本文利用一类准循环码的结构进行计算机搜索,再加上通常的码的变换,共得到了七个新的二元线性码,它们都改进了文「1」中二元线性码极小距离的下界,其中有三个是最优的。 相似文献
7.
8.
9.
10.
基于环Fp+vFp(v2=v)上线性码的一种直和分解,利用环Fp+vFp上的线性码的Torsion码,把环Fp+vFp上的线性码的极小支座谱的确定归结于有限域上的情形;进一步探讨了环Fp+vFp上的线性码的校验矩阵,利用该校验矩阵确定了环Fp+vFp上的线性码的对偶码的极小支座谱;最后利用环上的线性码的极小支座谱,探讨了环Fp+vFp上线性码的最小Hamming距离,并且给出了一个环Fp+vFp上最小Hamming距离为d的线性码的构造方法,这里p是任一个素数,d是一个正整数. 相似文献
11.
Secret sharing schemes from three classes of linear codes 总被引:1,自引:0,他引:1
Yuan J. Ding C. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2006,52(1):206-212
Secret sharing has been a subject of study for over 20 years, and has had a number of real-world applications. There are several approaches to the construction of secret sharing schemes. One of them is based on coding theory. In principle, every linear code can be used to construct secret sharing schemes. But determining the access structure is very hard as this requires the complete characterization of the minimal codewords of the underlying linear code, which is a difficult problem in general. In this paper, a sufficient condition for all nonzero codewords of a linear code to be minimal is derived from exponential sums. Some linear codes whose covering structure can be determined are constructed, and then used to construct secret sharing schemes with nice access structures. 相似文献
12.
13.
Carlet C. Ding C. Yuan J. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2005,51(6):2089-2102
In this paper, error-correcting codes from perfect nonlinear mappings are constructed, and then employed to construct secret sharing schemes. The error-correcting codes obtained in this paper are very good in general, and many of them are optimal or almost optimal. The secret sharing schemes obtained in this paper have two types of access structures. The first type is democratic in the sense that every participant is involved in the same number of minimal-access sets. In the second type of access structures, there are a few dictators who are in every minimal access set, while each of the remaining participants is in the same number of minimal-access sets. 相似文献
14.
Cramer R. Daza V. Gracia I. Urroz J.J. Leander G. Marti-Farre J. Padro C. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2008,54(6):2644-2657
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, the connections between codes, matroids, and a special class of secret sharing schemes, namely, multiplicative linear secret sharing schemes (LSSSs), are studied. Such schemes are known to enable multiparty computation protocols secure against general (nonthreshold) adversaries. Two open problems related to the complexity of multiplicative LSSSs are considered in this paper. The first one deals with strongly multiplicative LSSSs. As opposed to the case of multiplicative LSSSs, it is not known whether there is an efficient method to transform an LSSS into a strongly multiplicative LSSS for the same access structure with a polynomial increase of the complexity. A property of strongly multiplicative LSSSs that could be useful in solving this problem is proved. Namely, using a suitable generalization of the well-known Berlekamp-Welch decoder, it is shown that all strongly multiplicative LSSSs enable efficient reconstruction of a shared secret in the presence of malicious faults. The second one is to characterize the access structures of ideal multiplicative LSSSs. Specifically, the considered open problem is to determine whether all self-dual vector space access structures are in this situation. By the aforementioned connection, this in fact constitutes an open problem about matroid theory, since it can be restated in terms of representability of identically self-dual matroids by self-dual codes. A new concept is introduced, the flat-partition, that provides a useful classification of identically self-dual matroids. Uniform identically self-dual matroids, which are known to be representable by self-dual codes, form one of the classes. It is proved that this property also holds for the family of matroids that, in a natural way, is the next class in the above classification: the identically self-dual bipartite matroids. 相似文献
15.
Multipartite secret sharing schemes are those having a multipartite access structure, in which the set of participants is
divided into several parts and all participants in the same part play an equivalent role. In this work, the characterization
of ideal multipartite access structures is studied with all generality. Our results are based on the well-known connections
between ideal secret sharing schemes and matroids and on the introduction of a new combinatorial tool in secret sharing, integer polymatroids . 相似文献
16.
Secure communication has become more and more important for system security. Since avoiding the use of encryption one by one can introduce less computation complexity, secret sharing scheme (SSS) has been used to design many security protocols. In SSSs, several authors have studied multipartite access structures, in which the set of participants is divided into several parts and all participants in the same part play an equivalent role. Access structures realized by threshold secret sharing are the simplest multipartite access structures, i.e., unipartite access structures. Since Asmuth–Bloom scheme based on Chinese remainder theorem (CRT) was presented for threshold secret sharing, recently, threshold cryptography based on Asmuth–Bloom secret sharing were firstly proposed by Kaya et al. In this paper, we extend Asmuth–Bloom and Kaya schemes to bipartite access structures and further investigate how SSSs realizing multipartite access structures can be conducted with the CRT. Actually, every access structure is multipartite and, hence, the results in this paper can be seen as a new construction of general SSS based on the CRT. Asmuth–Bloom and Kaya schemes become the special cases of our scheme. 相似文献
17.
Given a set of participants that is partitioned into distinct compartments, a multipartite access structure is an access structure
that does not distinguish between participants belonging to the same compartment. We examine here three types of such access
structures: two that were studied before, compartmented access structures and hierarchical threshold access structures, and
a new type of compartmented access structures that we present herein. We design ideal perfect secret sharing schemes for these
types of access structures that are based on bivariate interpolation. The secret sharing schemes for the two types of compartmented
access structures are based on bivariate Lagrange interpolation with data on parallel lines. The secret sharing scheme for
the hierarchical threshold access structures is based on bivariate Lagrange interpolation with data on lines in general position.
The main novelty of this paper is the introduction of bivariate Lagrange interpolation and its potential power in designing
schemes for multipartite settings, as different compartments may be associated with different lines or curves in the plane.
In particular, we show that the introduction of a second dimension may create the same hierarchical effect as polynomial derivatives
and Birkhoff interpolation were shown to do in Tassa (J. Cryptol. 20:237–264, 2007).
A preliminary version of this paper appeared in The Proceedings of ICALP 2006. 相似文献
18.
Secret sharing schemes with bipartite access structure 总被引:7,自引:0,他引:7
Padro C. Saez G. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2000,46(7):2596-2604
We study the information rate of secret sharing schemes whose access structure is bipartite. In a bipartite access structure there are two classes of participants and all participants in the same class play an equivalent role in the structure. We characterize completely the bipartite access structures that can be realized by an ideal secret sharing scheme. Both upper and lower bounds on the optimal information rate of bipartite access structures are given. These results are applied to the particular case of weighted threshold access structure with two weights 相似文献
19.
对一般接入结构上的可验证多秘密分享进行了研究,给出了可适用于任意接入结构的一类可验证多秘密分享方案的构造方法。用这种方法构造的可验证多秘密分享方案具有以下性质:可在一组分享者中同时分享多个秘密;分发者发送给每一分享者的秘密份额都是可公开验证的;关于每一秘密的公开信息也是可公开验证的;恢复秘密时可防止分享者提供假的份额。分析表明,用此方法构造的可验证多秘密分享方案不仅是安全的,而且是高效的。 相似文献