Skip to main navigation Skip to search Skip to main content

Secret sharing schemes for dense forbidden graphs

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations

    Abstract

    A secret-sharing scheme realizes a given graph if every two vertices connected by an edge can reconstruct the secret and every independent set in the graph does not get any information about the secret. A secret-sharing scheme realizes a forbidden graph if every two vertices connected by an edge can reconstruct the secret and every two vertices which are not connected by an edge do not get any information about the secret. Similar to secret-sharing schemes for general access structures, there are gaps between the known lower bounds and upper bounds on the total share size for graphs and for forbidden graphs. Following [Beimel et al. CRYPTO 2012], our goal in this paper is to understand how the total share size increases by removing few edges from a graph that can be realized by an efficient secret-sharing scheme. We show that if a graph with n vertices contains at least (Formula Presented) edges for some (Formula Presented), i.e., it is obtained by removing few edges from the complete graph, then there is a scheme realizing its forbidden graph in which the total share size is O(n7/6+2β/3). This should be compared to O(n3/2), the best known upper bound for the total share size in general forbidden graphs. Additionally, we show that a forbidden graph access structure obtained by removing few edges from an arbitrary graph G can be realized by a secret-sharing scheme with total share size of O(m+ n7/6+2β/3), where m is the total size of the shares in a secretsharing scheme realizing G and n1+β is the number of the removed edges. We also show that for a graph obtained by removing few edges from an arbitrary graph G with n vertices, if the chromatic number of the graph that contains the removed edges is small, then there is a fairly efficient scheme realizing the resulting graph; specifically, we construct a secret-sharing scheme with total share size of Õ(m2/3n2/3+2β/3c1/3), where m is the total size of the shares in a secret-sharing scheme realizing G, the value n1+β is an upper bound on the number of the removed edges, and c is the chromatic number of the graph of the removed edges. This should be compared to O(n2/ log(n)), the best known upper bound for the total share size for general graphs.

    Original languageEnglish
    Title of host publicationSecurity and Cryptography for Networks - 10th International Conference, SCN 2016, Proceedings
    EditorsRoberto De Prisco, Vassilis Zikas
    PublisherSpringer Verlag
    Pages509-528
    Number of pages20
    ISBN (Print)9783319446172
    DOIs
    StatePublished - 1 Jan 2016
    Event10th International Conference on Security and Cryptography for Networks, SCN 2016 - Amalfi, Italy
    Duration: 31 Aug 20162 Sep 2016

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume9841 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference10th International Conference on Security and Cryptography for Networks, SCN 2016
    Country/TerritoryItaly
    CityAmalfi
    Period31/08/162/09/16

    Keywords

    • Avoiding covers
    • Covers by graphs
    • Secret sharing

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'Secret sharing schemes for dense forbidden graphs'. Together they form a unique fingerprint.

    Cite this