KURIHARA Jun   UYEMATSU Tomohiko   MATSUMOTO Ryutaroh   
IEICE transactions on fundamentals of electronics, communications and computer sciences 95(11) 2067-2075 2012年11月 [査読有り]
This paper precisely characterizes secret sharing schemes based on arbitrary linear codes by using the relative dimension/length profile (RDLP) and the relative generalized Hamming weight (RGHW). We first describe the equivocation Δm...
KURIHARA Jun   UYEMATSU Tomohiko   
IEICE transactions on fundamentals of electronics, communications and computer sciences 94(6) 1375-1380 2011年6月 [査読有り]
This paper presents a novel technique to realize Karnin et al.'s (k,n)-threshold schemes over binary field extensions as a software. Our realization uses the matrix representation of finite fields and matrix-vector multiplications, a...