Constructions of some secret sharing schemes based on linear codes
There are perfect and ideal threshold secret sharing schemes, for example, Shamir’s secret sharing scheme. For the case of general secret sharing schemes with an arbitrary access structure, it is possible to construct a perfect scheme for any access structure (for example, the It...
| Published in: | Известия Саратовского университета. Новая серия: Математика. Механика. Информатика |
|---|---|
| Main Author: | |
| Format: | Article |
| Language: | English |
| Published: |
Saratov State University
2024-08-01
|
| Subjects: | |
| Online Access: | https://mmi.sgu.ru/sites/mmi.sgu.ru/files/text-pdf/2024/08/330-341-ratseev.pdf |
