Secret sharing schemes from hypersurfaces over finite fields

05/30/2021
by   Angela Aguglia, et al.
0

Linear error-correcting codes can be used for constructing secret sharing schemes, however finding in general the access structures of these secret sharing schemes and, in particular, determining efficient access structures is difficult. Here we investigate the properties of certain algebraic hypersurfaces over finite fields, whose intersection numbers with any hyperplane only takes a few values. These varieties give rise to q-divisible linear codes with at most 5 weights. Furthermore, for q odd these codes turn out to be minimal and we characterize the access structures of the secret sharing schemes based on their dual codes. Indeed, we prove that the secret sharing schemes thus obtained are democratic that is, each participant belongs to the same number of minimal access sets.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/28/2018

Exploring Quantum Supremacy in Access Structures of Secret Sharing by Coding Theory

We consider secret sharing schemes with a classical secret and quantum s...
research
05/07/2021

Leakage-Resilient Secret Sharing with Constant Share Size

We consider the leakage resilience of AG code-based ramp secret sharing ...
research
10/12/2019

On the equivalence of authentication codes and robust (2,2)-threshold schemes

In this paper, we show a "direct" equivalence between certain authentica...
research
08/14/2019

Complexity of universal access structures

An important parameter in a secret sharing scheme is the number of minim...
research
08/20/2018

Toric Varieties and Codes, Error-correcting Codes, Quantum Codes, Secret Sharing and Decoding

We present toric varieties and associated toric codes and their decoding...
research
11/13/2018

Classical Access Structures of Ramp Secret Sharing Based on Quantum Stabilizer Codes

In this paper we consider to use the quantum stabilizer codes as secret ...
research
09/30/2019

Secret sharing and duality

Secret sharing is an important building block in cryptography. All expli...

Please sign up or login with your details

Forgot password? Click here to reset