GRAPH DECOMPOSITIONS AND SECRET SHARING SCHEMES

Citation
C. Blundo et al., GRAPH DECOMPOSITIONS AND SECRET SHARING SCHEMES, Journal of cryptology, 8(1), 1995, pp. 39-64
Citations number
42
Categorie Soggetti
Computer Sciences","Computer Science Theory & Methods
Journal title
ISSN journal
09332790
Volume
8
Issue
1
Year of publication
1995
Pages
39 - 64
Database
ISI
SICI code
0933-2790(1995)8:1<39:GDASSS>2.0.ZU;2-V
Abstract
In this paper we continue a study of secret sharing schemes for access structures based on graphs. Given a graph G, we require that a subset of participants can compute a secret key if they contain an edge of G ; otherwise, they can obtain no information regarding the key. We stud y the information rate of such schemes, which measures how much inform ation in being distributed as shares compared with the size of the sec ret key, and the average information rate, which is the ratio between the secret size and the arithmetic mean of the size of the shares. We give both upper and lower bounds on the optimal information rate and a verage information rate that can be obtained. Upper bounds arise by ap plying entropy arguments due to Capocelli et al. [15]. Lower bounds co me from constructions that are based on graph decompositions. Applicat ion of these constructions requires solving a particular linear progra mming problem. We prove some general results concerning the informatio n rate and average information rate for paths, cycles, and trees. Also , we study the 30 (connected) graphs on at most five vertices, obtaini ng exact values for the optimal information rate in 26 of the 30 cases , and for the optimal average information rate in 28 of the 30 cases.