Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct...Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct the secret sharing schemes. Since the code of a symmetric (V, k, λ)-design is a linear code, this study is about the secret sharing schemes based on C of Fp-code C of asymmetric (v, k, λ)-design.展开更多
In an anonymous secret sharing scheme the secret can be reconstructed without knowledge of which participants hold which shares. In this paper some constructions of anonymous secret sharing schemes with 2 thresholds b...In an anonymous secret sharing scheme the secret can be reconstructed without knowledge of which participants hold which shares. In this paper some constructions of anonymous secret sharing schemes with 2 thresholds by using combinatorial designs are given. Let v(t, w, q) denote the minimum size of the set of shares of a perfect anonymous (t, w) threshold secret sharing scheme with q secrets. In this paper we prove that v(t, w, q) - Θ(q) if t and w are fixed and that the lower bound of the size of the set of shares in [4] is not optimal under certain condition.展开更多
In this paper using the weight enumerators of a linear [n, k]--code, we give a theorem about minimal codewords. In this n context, we show that while 1 E C if Wmin〉 n/2 in the binary [n, k] --code C, then all of the...In this paper using the weight enumerators of a linear [n, k]--code, we give a theorem about minimal codewords. In this n context, we show that while 1 E C if Wmin〉 n/2 in the binary [n, k] --code C, then all of the nonzero codewords of C are 2 minimal. Therefore, we obtain a corollary.展开更多
文摘Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct the secret sharing schemes. Since the code of a symmetric (V, k, λ)-design is a linear code, this study is about the secret sharing schemes based on C of Fp-code C of asymmetric (v, k, λ)-design.
基金Supported by the National Natural Science Foundation of China(No.10501049,90304012) 973 Project(No.2004CB318000)
文摘In an anonymous secret sharing scheme the secret can be reconstructed without knowledge of which participants hold which shares. In this paper some constructions of anonymous secret sharing schemes with 2 thresholds by using combinatorial designs are given. Let v(t, w, q) denote the minimum size of the set of shares of a perfect anonymous (t, w) threshold secret sharing scheme with q secrets. In this paper we prove that v(t, w, q) - Θ(q) if t and w are fixed and that the lower bound of the size of the set of shares in [4] is not optimal under certain condition.
文摘In this paper using the weight enumerators of a linear [n, k]--code, we give a theorem about minimal codewords. In this n context, we show that while 1 E C if Wmin〉 n/2 in the binary [n, k] --code C, then all of the nonzero codewords of C are 2 minimal. Therefore, we obtain a corollary.