Cryptography Reference
In-Depth Information
6.4.2 A Scheme for General Access Structure
Let P = f1; 2; ;ng be a set of participants, 2
P
represents the set of all
subsets of P. Let
qual
2
P
and
forb
2
P
, where
qual
\
forb
= . The
members of
qual
(resp.
forb
) is called qualified sets (resp. forbidden sets).
The = (
qual
;
forb
) is called the access structure. Define
0
= fA 2
qual
:
A
0
2
qual
for all A
0
Ag be all the minimal qualied sets [1].
Suppose
0
= f
Q
1
; ;
Q
t
g, by employing the optimal (k;k)-scheme
[16], the basis matrices L
0
and L
1
are constructed as follows:
Let k
p
= j
Q
p
j, and
Q
p
= fp
1
; ;p
k
p
g, for 1 p t. We will construct
a n2
k
p
1
matrix E
p
, i 2f0; 1g according to the following steps: the p
i
row of
E
p
is the i-th row of the basis matrix B
0
of the (k
p
;k
p
)-scheme. The elements
of other rows of E
p
are all 1's.
Then L
0
= E
1
. The construction of E
p
is similar to E
p
except we replace
the p
i
row of E
p
from the basis matrix B
1
of the (k
p
;k
p
)-scheme instead of
B
0
. Then L
1
= E
1
kkE
t
.
Lemma 10 [10] The L
0
and L
1
are a pair of basis matrices of a perfect black
VC scheme for
0
such that the expansion rate is m = 2
jQ
1
1j
++ 2
jQ
t
1j
and GRAY (white) = 1 1=m.
We now construct an n 2
k
p
1
matrix F
p
, which has the property that
the elements in pi
i
row of F
p
are all 0's and the other rows of F
p
are all 1's,
here 1 p t. Then an auxiliary basis matrix A
0
= F
1
jjF
i
.
Search WWH ::
Custom Search