Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2015, Vol. 9 Issue (5) : 778-787    https://doi.org/10.1007/s11704-015-3255-6
RESEARCH ARTICLE
The optimal information rate for graph access structures of nine participants
Yun SONG1,Zhihui LI1,*(),Yongming LI2,Ren XIN3
1. College of Mathematics and Information Science, Shaanxi Normal University, Xi’an 710062, China
2. College of Computer Science, Shaanxi Normal University, Xi’an 710062, China
3. School of Civil Engineering, Xi’an University of Architecture and Technology, Xi’an 710055, China
 Download: PDF(592 KB)  
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

The information rate is an important metric of the performance of a secret-sharing scheme. In this paper we consider 272 non-isomorphic connected graph access structures with nine vertices and eight or nine edges, and either determine or bound the optimal information rate in each case. We obtain exact values for the optimal information rate for 231 cases and present a method that is able to derive information-theoretical upper bounds on the optimal information rate. Moreover, we apply some of the constructions to determine lower bounds on the information rate. Regarding information rate, we conclude with a full listing of the known optimal information rate (or bounds on the optimal information rate) for all 272 graphs access structures of nine participants.

Keywords optimal information rate      perfect secret-sharing scheme      entropy method      graph access structure      splitting construction      L-decomposition      weighted decomposition     
Corresponding Author(s): Zhihui LI   
Issue Date: 24 September 2015
 Cite this article:   
Yun SONG,Zhihui LI,Yongming LI, et al. The optimal information rate for graph access structures of nine participants[J]. Front. Comput. Sci., 2015, 9(5): 778-787.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-015-3255-6
https://academic.hep.com.cn/fcs/EN/Y2015/V9/I5/778
1 Shamir A. How to share a secret. Communications of the ACM, 1979, 24: 612―613
https://doi.org/10.1145/359168.359176
2 Blakley G R. Safeguarding cryptographic keys. Proceedings of AFIPS National Computer Conference. 1979, 48: 313―317
3 Yuan H D. Secret sharing with multi-cover adaptive steganography. Information Sciences, 2014, 254(1): 197―212
https://doi.org/10.1016/j.ins.2013.08.012
4 Chen C C, Wu W J. A secure Boolean-based multi-secret image sharing scheme. Journal of Systems and Software, 2014, 92(7): 107―114
https://doi.org/10.1016/j.jss.2014.01.001
5 Ulutas G, Ulutas M, Nabiyev V V. Secret image sharing scheme with adaptive authentication strength. Pattern Recognition Letters, 2013, 34(3): 283―291
https://doi.org/10.1016/j.patrec.2012.10.017
6 Lein H, Miao F Y. Multilevel threshold secret sharing based on the Chinese Remainder Theorem. Information Processing Letters, 2014, 114(9): 504―509
https://doi.org/10.1016/j.ipl.2014.04.006
7 Brickell E F, Stinson D R. Some improved bounds on the information rate of perfect secret sharing schemes. Journal of Cryptology, 1992, 5(3): 153―166
https://doi.org/10.1007/BF02451112
8 Lu H C, Fu H L. New bounds on the average information rate of secretsharing schemes for graph-based weighted threshold access tructures. Information Sciences, 2013, 240(10): 83―94
https://doi.org/10.1016/j.ins.2013.03.047
9 Jackson W, Martin K M. Perfect secret sharing schemes on five participants. Designs, Codes and Cryptography, 1996, 9(3): 267―286
https://doi.org/10.1007/BF00129769
10 van Dijk M. On the information rate of perfect secret sharing schemes. Designs, Codes and Cryptography, 1995, 6(2): 143―169
https://doi.org/10.1007/BF01398012
11 Song Y, Li ZH, Wang WC. The information rate of secret sharing schemes based on seven participants by connect graphs. Lecture Notes in Electrical Engineering, 2012, 127: 637―645
https://doi.org/10.1007/978-3-642-25769-8_90
12 Wang W C, Li Z H, Song Y. The optional information rate of perfect secret sharing schemes. In: Proceedings of the 2011 International Conference on Business Management and Electronic Information. 2011, 207―212
https://doi.org/10.1109/ICBMEI.2011.5917883
13 Sun H M, Chen B L. Weighted decomposition construction for perfect secret sharing schemes. Computers & Mathematics with Applications, 2002, 43(6): 877―887
https://doi.org/10.1016/S0898-1221(01)00328-5
14 Gharahi M, Dehkordi M H. The complexity of the graph access structures on six participants. Designs, Codes and Cryptography, 2013, 67(2): 169―173
https://doi.org/10.1007/s10623-011-9592-z
15 Padrí? C, Ví?zquez L. Finding lower bounds on the complexity of secret sharing schemes by linear prog ramming. Lecture Notes in Computer Science, 2010, 6034: 344―355
https://doi.org/10.1007/978-3-642-12200-2_31
16 Capocelli R M, De Santis A, Gargano L, Vaccaro U. On the size of shares of secret sharing schemes. Journal of Cryptology, 1993, 6(3): 157―168
https://doi.org/10.1007/BF00198463
17 Cover T M, Thomas J A. Elements of Information Theory. 2nd ed. Wiley: New York, 2006
18 Stinson D R. Cryptography theory and practice. 3rd ed. CRC/C&H, 2009
[1] Supplementary Material-Highlights in 3-page ppt
Download
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed