An ideal hierarchical secret sharing scheme

03/27/2020
by   Ghanem Meriem, et al.
0

One of the methods used in order to protect a secret K is a secret sharing scheme. In this scheme the secret K is distributed among a finite set of participants P by a special participant called the dealer, in such a way that only predefined subsets of participants can recover the secret after collaborating with their secret shares. The construction of secret sharing schemes has received a considerable attention of many searchers whose main goal was to improve the information rate. In this paper, we propose a novel construction of a secret sharing scheme which is based on the hierarchical concept of companies illustrated through its organization chart and represented by a tree. We proof that the proposed scheme is ideal by showing that the information rate equals 1. In order to show the efficiency of the proposed scheme, we discuss all possible kinds of attacks and proof that the security in ensured. Finally, we include a detailed didactic example for a small company organization chart.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/06/2023

Secret sharing scheme based on hashing

We propose an adaptive threshold multi secret sharing scheme based solel...
research
06/27/2019

Smallest graphs achieving the Stinson bound

Perfect secret sharing scheme is a method of distribute a secret informa...
research
02/21/2020

An Easy-to-implement Construction for (k,n)-threshold Progressive Visual Secret Sharing Schemes

Visual cryptography encrypts the secret image into n shares (transparenc...
research
09/14/2023

On Ideal Secret-Sharing Schemes for k-homogeneous access structures

A k-uniform hypergraph is a hypergraph where each k-hyperedge has exactl...
research
01/27/2022

Symmetries in Linear Programming for Information Inequalities

We study the properties of secret sharing schemes, where a random secret...
research
08/16/2021

Multiparty secret sharing based on hidden multipliers

Secret sharing schemes based on the idea of hidden multipliers in encryp...

Please sign up or login with your details

Forgot password? Click here to reset