Skip to main content
Top
Published in: Applicable Algebra in Engineering, Communication and Computing 1/2017

04-08-2016 | Original Paper

Secret sharing schemes based on additive codes over GF(4)

Authors: Jon-Lark Kim, Nari Lee

Published in: Applicable Algebra in Engineering, Communication and Computing | Issue 1/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A secret sharing scheme (SSS) was introduced by Shamir in 1979 using polynomial interpolation. Later it turned out that it is equivalent to an SSS based on a Reed–Solomon code. SSSs based on linear codes have been studied by many researchers. However there is little research on SSSs based on additive codes. In this paper, we study SSSs based on additive codes over GF(4) and show that they require at least two steps of calculations to reveal the secret. We also define minimal access structures of SSSs from additive codes over GF(4) and describe SSSs using some interesting additive codes over GF(4) which contain generalized 2-designs.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Blakley, G.R.: Safeguarding cryptographic keys. In: National Computer Conference, pp. 313–317. American Federation of Information Processing Societies (1979) Blakley, G.R.: Safeguarding cryptographic keys. In: National Computer Conference, pp. 313–317. American Federation of Information Processing Societies (1979)
3.
4.
5.
6.
go back to reference Ding, C., Yuan, J.: Covering and secret sharing with linear codes. In: Calude C. S., Dinneen M. J., Vajnovszki V (eds.) Discrete Mathematics and Theoretical Computer Science, pp. 11–25. Springer, Heidelberg (2003) Ding, C., Yuan, J.: Covering and secret sharing with linear codes. In: Calude C. S., Dinneen M. J., Vajnovszki V (eds.) Discrete Mathematics and Theoretical Computer Science, pp. 11–25. Springer, Heidelberg (2003)
7.
go back to reference Dougherty, S.T., Mesnager, S., Solé, P.: Secret-sharing schemes based on self-dual codes. In: Information Theory Workshop. ITW’08. IEEE (2008) Dougherty, S.T., Mesnager, S., Solé, P.: Secret-sharing schemes based on self-dual codes. In: Information Theory Workshop. ITW’08. IEEE (2008)
9.
go back to reference Huffman, W. C., Gaborit, P., Kim, J.-L., Pless, V.: On additive \(GF (4)\) codes. In: Codes and Association Schemes: DIMACS Workshop Codes and Association Schemes, November 9–12, 1999, DIMACS Center. vol. 56. American Mathematical Society (2001) Huffman, W. C., Gaborit, P., Kim, J.-L., Pless, V.: On additive \(GF (4)\) codes. In: Codes and Association Schemes: DIMACS Workshop Codes and Association Schemes, November 9–12, 1999, DIMACS Center. vol. 56. American Mathematical Society (2001)
10.
go back to reference Huffman, W.C., Pless, V.: Fundamentals of Error-Correcting Codes, pp. 291–337. Cambridge University Press, New York (2003)CrossRefMATH Huffman, W.C., Pless, V.: Fundamentals of Error-Correcting Codes, pp. 291–337. Cambridge University Press, New York (2003)CrossRefMATH
13.
go back to reference MacWilliams, F.J., Odlyzko, A.M., Sloane, N.J.A., Ward, H.N.: Self-dual codes over \(GF(4)\). J. Comb. Theory Ser. A 25(3), 288–318 (1978)CrossRefMATHMathSciNet MacWilliams, F.J., Odlyzko, A.M., Sloane, N.J.A., Ward, H.N.: Self-dual codes over \(GF(4)\). J. Comb. Theory Ser. A 25(3), 288–318 (1978)CrossRefMATHMathSciNet
14.
go back to reference Massey, J. L.: Minimal codewords and secret sharing. In: Proceedings 6th Joint Swedish–Russian International Workshop on Information Theory, pp. 276–279 (1993) Massey, J. L.: Minimal codewords and secret sharing. In: Proceedings 6th Joint Swedish–Russian International Workshop on Information Theory, pp. 276–279 (1993)
15.
17.
Metadata
Title
Secret sharing schemes based on additive codes over GF(4)
Authors
Jon-Lark Kim
Nari Lee
Publication date
04-08-2016
Publisher
Springer Berlin Heidelberg
Published in
Applicable Algebra in Engineering, Communication and Computing / Issue 1/2017
Print ISSN: 0938-1279
Electronic ISSN: 1432-0622
DOI
https://doi.org/10.1007/s00200-016-0296-5

Premium Partner