• Complain

Selda Calkavur - Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory

Here you can read online Selda Calkavur - Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2022, publisher: World Scientific Pub Co Inc, genre: Home and family. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Selda Calkavur Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory

Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Secret sharing schemes form one of the most important topic in Cryptography. These protocols are used in many areas, applied mathematics, computer science, electrical engineering. A secret is divided into several pieces called shares. Each share is given to a user of the system. Each user has no information about the secret, but the secret can be retrieved by certain authorized coalition of users. This book is devoted to such schemes inspired by Coding Theory. The classical schemes of Shamir, Blakley, Massey are recalled. Survey is made of research in Combinatorial Coding Theory they trigerred, mostly self-dual codes, and minimal codes. Applications to engineering like image processing, and key management of MANETs are highlighted.

Selda Calkavur: author's other books


Who wrote Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory? Find out the surname, the name of the author of the book and a list of all author's works by series.

Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Pagebreaks of the print version

CODE BASED SECRET SHARING SCHEMES Applied Combinatorial Coding Theory CODE - photo 1

CODE BASED SECRET
SHARING SCHEMES

Applied Combinatorial Coding Theory

CODE BASED SECRET
SHARING SCHEMES

Applied Combinatorial Coding Theory

Selda alkavur

Kocaeli University, Turkey

Alexis Bonnecaze

University of Aix-Marseille, France

Romar dela Cruz

University of the Philippines Diliman, Philippines

Patrick Sol

University of Aix-Marseille, France

Published by World Scientific Publishing Co Pte Ltd 5 Toh Tuck Link - photo 2

Published by

World Scientific Publishing Co. Pte. Ltd.

5 Toh Tuck Link, Singapore 596224

USA office: 27 Warren Street, Suite 401-402, Hackensack, NJ 07601

UK office: 57 Shelton Street, Covent Garden, London WC2H 9HE

Library of Congress Control Number: 2022011655

British Library Cataloguing-in-Publication Data

A catalogue record for this book is available from the British Library.

CODE BASED SECRET SHARING SCHEMES
Applied Combinatorial Coding Theory

Copyright 2022 by World Scientific Publishing Co. Pte. Ltd.

All rights reserved. This book, or parts thereof, may not be reproduced in any form or by any means, electronic or mechanical, including photocopying, recording or any information storage and retrieval system now known or to be invented, without written permission from the publisher.

For photocopying of material in this volume, please pay a copying fee through the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, USA. In this case permission to photocopy is not required from the publisher.

ISBN 978-981-124-832-0 (hardcover)
ISBN 978-981-124-833-7 (ebook for institutions)
ISBN 978-981-124-834-4 (ebook for individuals)

For any available supplementary material, please visit
https://www.worldscientific.com/worldscibooks/10.1142/12585#t=suppl

Desk Editors: Vishnu Mohan/Rok Ting Tan

Typeset by Stallion Press
Email:

Printed in Singapore

Foreword

I am very happy that my colleagues from ATI team at Institut de Mathmatiques de Marseille (I2M), Alexis Bonnecaze and Patrick Sol, asked me to write a foreword their book on Code-Based Secret Sharing Schemes (SSS).

Both Alexis and Patrick are experts in Coding Theory, with a lifelong interest in cryptography. To speak about their two coauthors: Selda is a young Turkish cryptographer, and Romar is a young mathematician from Manila.

The book focuses on the interplay between Coding Theory and SSS. While the first and most popular SSS (Shamir scheme) was written in the language of polynomial interpolation over finite fields, it transpired soon that it was in fact related to Reed Solomon codes, the most famous class of codes after the Hamming codes. In subsequent years, research developed in several directions related to combinatorics of codes and designs. The concept of minimal code is an example related to Massey scheme. There are also some application to the so-called real world-like image processing.

The book collects classical applications and gives some examples of research related to the authors practice. I recommend it as a friendly introduction to a domain at the crossroads of mathematics, computer science and engineering.

Marseilles
July 24th 2021

Robert Rolland
Emeritus Professor at Aix-Marseille University
President of ACRYPTA

Preface

A pirate wants to disclose the secret of a treasure location to his crew. To avoid that the greedy sailors compete and fight for the secret, he dissects the map of the location into several pieces, and gives a piece to each crew member. One single piece of the map is not enough to locate the treasure. Several pieces are needed to find it. This small tale is a toy example of a secret-sharing scheme.

Secret-sharing schemes form one of the most important topic in Cryptography. These protocols are used in many areas, applied mathematics, computer science, engineering, etc. A secret-sharing scheme is an encryption method. A secret s is divided into n pieces called shares. Each piece has no information about the secret, but it is retrieved by a specified of combination of these pieces. Specifically, a secret-sharing scheme is called a (k, n)-threshold scheme if the following property holds. Any k out of n pieces can reach the secret s but k 1 or fewer pieces have no information about s. The k elements that are capable of recovering the secret are called minimal access elements. A central entity, called the dealer, distributes the pieces to the participants. This distribution phase constitutes the first step of the protocol. In a second step, the recovery phase, coalitions of participants can pool their respective shares, and, if they are authorized, run an algebraic algorithm to reconstruct the secret.

Secret-sharing schemes were introduced independently by Shamir [].

The aim of this book is twofold. First, we give a self-contained exposition of these classical protocols, and their various generalizations. This is the topic of .

References

[]A. Alahmadi, A. Altassan, A. AlKenani, S. alkavur, H. Shoaib and P. Sol. A multisecret-sharing scheme based on LCD codes. Mathematics, 8:272, 2020.

[]A. Alahmadi, R.E.L. Aldred, R. dela Cruz, P. Sol and C. Thomassen. The maximum number of minimal codewords in long codes. Discret. Appl. Math. 161(3):424429, 2013.

[3]A. Alahmadi, R.E.L. Aldred, R. dela Cruz, P. Sol and C. Thomassen. The maximum number of minimal codewords in an [n, k]-code. Discret. Math. 313(15):15691574, 2013.

[]A. Alahmadi, R.E.L. Aldred, R. dela Cruz, S. Ok, P. Sol and C. Thomassen. The minimum number of minimal codewords in an [n, k]-code and in graphic codes. Discret. Appl. Math., 184:3239, 2015.

[]A. Bonnecaze and A. Gabillon. On key distribution in MANETs. In SITIS, pp. 363368, 2009.

[]G.R. Blakley. Safeguarding cryptographic keys. In AFIPS 1979 Nat. Computer Conf., Vol. 48, pp. 313317, 1979.

[]D.-P. Le, A. Bonnecaze and A. Gabillon. A secure round-based times-tamping scheme. In ICISS08, 2008.

]S. alkavur. Secret-sharing schemes and syndrome decoding. J. Math. Statist. Sci., 2016:741750, 2016.

[]S. alkavur and F. Molla. The Blakley based secret sharing approach. Sigma J. Eng. Natural Sci., 37(2):489494, 2019.

[10]S. alkavur. Some secret sharing schemes based on the finite fields. Comput. Technol. Appl., 7:269272, 2016, doi: 10.17265/1934-7332/2016.06.001.

[11]S. alkavur. A secret sharing scheme based on residue class ring. Appl. Math. Inform. Sci., 9(4):13, 2015.

[12]S. alkavur. A study on minimality of the codewords in the dual code of the code of a symmetric (, k, )-design. Appl. Math. Inform. Sci., 9(6):14, 2015.

[13]S. alkavur. Secret sharing schemes based on the dual code of the code of a symmetric (, k, )-design and minimal access sets. Comput. Technol. Appl., 6:95100, 2015.

[]S. alkavur and F. Molla. An image secret sharing method based on Shamir secret sharing. Current Trends Comput. Sci. Appl., 1(2):1922, 2018.

[]S. alkavur and P. Sol. Multisecret-sharing schemes and bounded distance decoding of linear codes. Int. J. Comput. Math. 94(1):107114, 2017.

[]S. alkavur and P. Sol. Some multisecret-sharing schemes over finite fields.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory»

Look at similar books to Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory»

Discussion, reviews of the book Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.