Secret Sharing Schemes and Linear Codes

2007-12-14
Özadam, Hakan
Özbudak, Ferruh
Saygı, Zülfükar
The study of secret sharing schemes was independently initiated by Shamir and Blakely in 1979. Since then several other secret sharing schemes were introduced. Many of those schemes are (n,k) threshold systems. In this work we give a survey on secret sharing schemes using linear codes. We analyze Shamir’s scheme with an emphasis on the access structure. We explain Massey’s linear secret sharing scheme and mention its superiority to (n,k) threshold systems.
ISC Turkey 2007 Information Security and Cryptology Conference, (13 - 14 Aralık 2007)

Suggestions

Physicochemical mechanisms of different biopolymers' (lysozyme, gum arabic, whey protein, chitosan) adsorption on green tea extract loaded liposomes
Dag, Damla; Güner, Selen; Öztop, Halil Mecit (Elsevier BV, 2019-10-01)
Having various domains of applicability, liposomes have been the issue of many studies since 1960s. Kinetically stable nature of liposomes required incorporation of other substituents to gain storage stability and interaction of liposomes with polymers, electrolytes, proteins or lipids still requires further investigation to explain the underlying mechanism. In this study, polyphenol-rich green tea extract was encapsulated into liposomes by means of microfluidization in two different aqueous media (pH = 3.8...
Antecedents and consequences of organizational commitment
Ekrem Duman, Fatıma Betül; Bilgiç, Reyhan; Department of Psychology (2010)
In the present study, organizational commitment‘s relationship with a number of antecedents and consequences were examined. In more detail, firstly the effects of job characteristics (i.e., job variety, promotional opportunity, organizational fairness, and perceived organizational support) on three dimensions of organizational commitment namely affective, normative, and continuance commitment were examined. Secondly, how these three dimensions of organizational commitment predict two dimensions of performan...
Critical theory, deliberative democracy and international relations theory
Akdenizli, Dilek; Yalvaç, Faruk; Department of International Relations (2005)
In the 20th century, Critical Theory has been very influential on every discipline of social sciences including international relations. According to Critical IR Theory, traditional theories are problem solving and try to explain repetition and recurrence, rather than change; however, the main subject matter of an IR theory should be the change itself. The idea of change is also constitutive of Habermasian political thought. Jürgen Habermas, as a critical theorist, has developed the model of Deliberative De...
Inference of switching networks by using a piecewise linear formulation
Akçay, Didem; Öktem, Hakan; Department of Scientific Computing (2005)
Inference of regulatory networks has received attention of researchers from many fields. The challenge offered by this problem is its being a typical modeling problem under insufficient information about the process. Hence, we need to derive the apriori unavailable information from the empirical observations. Modeling by inference consists of selecting or defining the most appropriate model structure and inferring the parameters. An appropriate model structure should have the following properties. The model...
Linear codes from weakly regular plateaued functions and their secret sharing schemes
Mesnager, Sihem; Özbudak, Ferruh; Sinak, Ahmet (2019-03-01)
Linear codes, the most significant class of codes in coding theory, have diverse applications in secret sharing schemes, authentication codes, communication, data storage devices and consumer electronics. The main objectives of this paper are twofold: to construct three-weight linear codes from plateaued functions over finite fields, and to analyze the constructed linear codes for secret sharing schemes. To do this, we generalize the recent contribution of Mesnager given in (Cryptogr Commun 9(1):71-84, 2017...
Citation Formats
H. Özadam, F. Özbudak, and Z. Saygı, “Secret Sharing Schemes and Linear Codes,” presented at the ISC Turkey 2007 Information Security and Cryptology Conference, (13 - 14 Aralık 2007), 2007, Accessed: 00, 2021. [Online]. Available: https://hdl.handle.net/11511/85589.