dc.contributor.author | Herranz Sotoca, Javier |
dc.contributor.author | Sáez Moreno, Germán |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament de Matemàtiques |
dc.date.accessioned | 2019-03-29T13:50:04Z |
dc.date.issued | 2018-09-01 |
dc.identifier.citation | Herranz, J.; Saez, G. Secret sharing schemes for (k, n)-consecutive access structures. "Lecture notes in computer science", 1 Setembre 2018, vol. 11124, p. 463-480. |
dc.identifier.issn | 0302-9743 |
dc.identifier.uri | http://hdl.handle.net/2117/131021 |
dc.description.abstract | We consider access structures over a set P of n participants, defined by a parameter k with 1 = k = n in the following way: a subset is authorized if it contains participants i, i + 1,...,i + k - 1, for some i ¿ {1,...,n-k+1}. We call such access structures, which may naturally appear in real applications involving distributed cryptography, (k, n)- consecutive. We prove that these access structures are only ideal when k = 1, n - 1, n. Actually, we obtain the same result that has been obtained for other families of access structures: being ideal is equivalent to being a vector space access structure and is equivalent to having an optimal information rate strictly bigger than 2 3 . For the non-ideal cases, we give either the exact value of the optimal information rate, for k = n - 2 and k = n - 3, or some bounds on it. |
dc.format.extent | 18 p. |
dc.language.iso | eng |
dc.publisher | Springer |
dc.subject | Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica::Criptografia |
dc.subject.lcsh | Cryptography |
dc.subject.other | Secret sharing schemes |
dc.subject.other | ideal access structures |
dc.subject.other | information rate |
dc.title | Secret sharing schemes for (k, n)-consecutive access structures |
dc.type | Article |
dc.subject.lemac | Criptografia |
dc.subject.lemac | Matemàtica |
dc.contributor.group | Universitat Politècnica de Catalunya. MAK - Matemàtica Aplicada a la Criptografia |
dc.identifier.doi | 10.1007/978-3-030-00434-7_23 |
dc.relation.publisherversion | https://link.springer.com/chapter/10.1007%2F978-3-030-00434-7_23 |
dc.rights.access | Restricted access - publisher's policy |
local.identifier.drac | 23645473 |
dc.description.version | Postprint (author's final draft) |
dc.relation.projectid | info:eu-repo/grantAgreement/MINECO/1PE/MTM2016-77213-R |
dc.date.lift | 10000-01-01 |
local.citation.author | Herranz, J.; Saez, G. |
local.citation.publicationName | Lecture notes in computer science |
local.citation.volume | 11124 |
local.citation.startingPage | 463 |
local.citation.endingPage | 480 |