Skip to main content
Log in

Geometric secret sharing schemes and their duals

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

Given a set of participants we wish to distribute information relating to a secret in such a way that only specified groups of participants can reconstruct the secret. We consider here a special class of such schemes that can be described in terms of finite geometries as first proposed by Simmons. We formalize the Simmons model and show that given a geometric scheme for a particular access structure it is possible to find another geometric scheme whose access structure is the dual of the original scheme, and which has the same average and worst-case information rates as the original scheme. In particular this shows that if an ideal geometric scheme exists then an ideal geometric scheme exists for the dual access structure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Benaloh, J. and Leichter, J. 1990. Generalized secret sharing and monotone functions. Advances in cryptology—Crypto '88, Lecture Notes inComput. Sci. 403:27–35.

    Google Scholar 

  2. Beutelspacher, A. and Vedder, K. 1989. Geometric structures as threshold schemes.Proc. of 1986 IMA Conf. on Cryptography and Coding, Oxford, Clarendon Press pp. 255–268.

    Google Scholar 

  3. Blakley, G.R. 1979. Safeguarding cryptographic keys.Proceedings of AFIPS 1979 National Computer Conference 48:313–317.

    Google Scholar 

  4. Blundo, C. 1991. Secret sharing schemes for access structures based on graphs. Tesi di Laurea, University of Salerno, Italy.

    Google Scholar 

  5. Brickell, E.F. and Davenport, D.M. 1991. On the classification of ideal secret sharing schemes.J. Cryptology 2:123–124.

    Google Scholar 

  6. Brickell, E.F. and Stinson, D.R. 1992. Some improved bounds on the information rate of perfect secret sharing schemes.J. Cryptology 2:153–166.

    Google Scholar 

  7. Hirschfeld, J.W.P. 1979.Projective Geometries over Finite Fields. Oxford, Clarendon Press.

    Google Scholar 

  8. Ito, M. Saito, A., and Nishizedi, T. 1987. Secret sharing scheme realizing general access structure.Proceedings IEEE Global Telecom. Conf., Globecom '87, Washington, D.C.: IEEE Comm. Soc. Press 99–102.

    Google Scholar 

  9. Jackson, W.-A. and Martin, K.M. On ideal secret sharing schemes. Preprint.

  10. Martin, K.M. New Secret Sharing Schemes from Old. To appear inJ. Combin. Math. Combin. Comput.

  11. Shamir, A. 1979. How to share a secret.Comm. ACM 22 11:612–613.

    Google Scholar 

  12. Simmons, G.J. 1990. How to (really) share a secret. Advances in Cryptology—Crypto '88, Lectures Notes inComput. Sci. 403:390–448.

    Google Scholar 

  13. Simmons, G.J., Jackson, W.-A., and Martin, K. 1991. The Geometry of Shared Secret Schemes. Bull. Inst. Combin. Appl. 1:71–88.

    Google Scholar 

  14. Simmons, G.J. 1992. An introduction to shared secret and/or shared control schemes and their applications.Contemporary Cryptology: The Science of Information Integrity, Piscataway, N.J.: IEEE Press.

    Google Scholar 

  15. Stinson, D.R. 1992. An explication of secret sharing schemes.Des. Codes Crptogr. 2:357–390.

    Google Scholar 

  16. Uehara, T., Nishizeki, T., Okamoto, E., and Nakamura, K. 1986. A secret sharing system with matroidal access structure.Trans. IECE Japan J69-A 9:1124–1132.

    Google Scholar 

  17. Welsh, D.J.A. 1976.Matroid Theory. London: Academic Press Inc. Ltd.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

Communicated by D. Jungnickel

This work was supported by the Science and Engineering Research Council Grant GR/G 03359.

This work was supported by the Australian Research Council.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Jackson, WA., Martin, K.M. Geometric secret sharing schemes and their duals. Des Codes Crypt 4, 83–95 (1994). https://doi.org/10.1007/BF01388562

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF01388562

Keywords

Navigation