Cryptography: Theory and Practice:Secret Sharing Schemes

cryptography: theory and practice Cryptography: Theory and Practice
by Douglas Stinson
CRC Press, CRC Press LLC
ISBN: 0849385210   Pub Date: 03/17/95
  

Previous Table of Contents Next


THEOREM 11.5

Suppose G = (V, E) is a complete multipartite graph. Then there is an ideal scheme realizing the access structure cl (E) on participant set V.

PROOF  Let be the parts of G. Let be distinct elements of , where . Let d = 2. For every participant vVi, define φ(v) = (xi, 1).

It is straightforward to verify Property (11.3). By Theorem 11.4, we have an ideal scheme.

To illustrate the application of these constructions, we will consider the possible access structures for up to four participants. Note that it suffices to consider only the access structures in which the basis cannot be partitioned into two non-empty subsets on disjoint participant sets. (For example, Γ0 = {{P1, P2}, {P3, P4}} can be partitioned as {{P1, P2}} ∪ {{P3, P4}} so we do not consider it.) We list the non-isomorphic access structures of this type on two, three, and four participants in Table 11.1 (the quantities ρ* are defined in Section 11.7).

Of these 18 access structures, we can already obtain ideal schemes for ten of them using the constructions we have at our disposal now. These ten access structures are either threshold access structures or have a basis which is a complete multipartite graph, so Theorem 11.5 can be applied. One such access structure is # 9, whose basis is the complete multipartite graph K1,1,2. We illustrate in the following example.

Example 11.7

For access structure # 9, take d = 2, p ≥ 3, and define φ as follows:

Table 11.1 Access structures for at most four participants
  w subsets in Γ0 ρ* comments
1. 2 P1P2 1 (2, 2)-threshold
2. 3 P1P2, P2P3 1 Γ0K1,2
3. 3 P1P2, P2P3, P1P3 1 (2, 3)-threshold
4. 3 P1P2P3 1 (3, 3)-threshold
5. 4 P1P2, P2P3, P3P4 2/3  
6. 4 P1P2, P1P3, P1P4 1 Γ0K1,3
7. 4 P1P2, P1P4, P2P3, P3P4 1 Γ0K2,2
8. 4 P1P2, P2P3, P2P4, P3P4 2/3  
9. 4 P1P2, P1P3, P1P4, P2P3, P2P4 1 Γ0K1,1,2
10. 4 P1P2, P1P3, P1P4, P2P3, P2P4, P3P4 1 (2, 4)-threshold
11. 4 P1P2P3, P1P4 1  
12. 4 P1P 3P4, P1P2, P2P3 2/3  
13. 4 P1P3P4,P1P2, P2P3, P2P4 2/3  
14. 4 P1P2P3, P1P2P4 1  
15. 4 P1P2P3, P1P2P4, P3P4 1  
16. 4 P1P2P3, P1P2P4, P1P3P4 1  
17. 4 P1P2P3, P1P2P4, P1P3P4, P2P3P4 1 (3, 4)-threshold
18. 4 P1P2P3P4 1 (4, 4)-threshold


Previous Table of Contents Next

Copyright © CRC Press LLC



Cryptography. Theory and Practice
Modern Cryptography: Theory and Practice
ISBN: 0130669431
EAN: 2147483647
Year: 1995
Pages: 133
Authors: Wenbo Mao

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net