ON SECRET-SHARING MATROIDS

被引:59
|
作者
SEYMOUR, PD
机构
[1] Bellcore, Morristown, NJ 07962
关键词
D O I
10.1016/0095-8956(92)90007-K
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
A matroid M is secret-sharing if there is a finite set S and a matrix A = (aij: i ∈ I, j ∈ E(M)) with entries in S, such that for all X ⊇ E(M), the submatrix (aij : i ∈ I, j ∈ X) has precisely |S|rk(χ) distinct rows. Such matroids occur naturally in the study of secret-sharing schemes in cryptography. Brickell and Davenport (J. Cryptography, to appear) asked if every matroid is a secret-sharing matroid. We answer this negatively, by showing that the Vamos matroid is not. © 1992.
引用
收藏
页码:69 / 73
页数:5
相关论文
共 50 条
  • [21] DECOMPOSITION CONSTRUCTIONS FOR SECRET-SHARING SCHEMES
    STINSON, DR
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (01) : 118 - 125
  • [22] Improving quantum secret-sharing schemes
    Nascimento, ACA
    Mueller-Quade, J
    Imai, H
    [J]. PHYSICAL REVIEW A, 2001, 64 (04): : 423111 - 423115
  • [23] Generalized semiquantum secret-sharing schemes
    Gheorghiu, Vlad
    [J]. PHYSICAL REVIEW A, 2012, 85 (05):
  • [24] Secret-sharing with a class of ternary codes
    Ding, CS
    Kohel, DR
    Ling, S
    [J]. THEORETICAL COMPUTER SCIENCE, 2000, 246 (1-2) : 285 - 298
  • [25] Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals
    Bellare, Mihir
    Rogaway, Phillip
    [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 172 - +
  • [26] Secret-Sharing Schemes for Very Dense Graphs
    Beimel, Amos
    Mintz, Yuval
    Farras, Oriol
    [J]. JOURNAL OF CRYPTOLOGY, 2016, 29 (02) : 336 - 362
  • [27] Multi-linear Secret-Sharing Schemes
    Beimel, Amos
    Ben-Efraim, Aner
    Padro, Carles
    Tyomkin, Ilya
    [J]. THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 394 - 418
  • [28] Secret-Sharing Schemes for Very Dense Graphs
    Amos Beimel
    Oriol Farràs
    Yuval Mintz
    [J]. Journal of Cryptology, 2016, 29 : 336 - 362
  • [29] The access structure of some secret-sharing schemes
    Renvall, A
    Ding, CS
    [J]. INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 67 - 78
  • [30] A Survey on Perfectly Secure Verifiable Secret-sharing
    Chandramouli, Anirudh
    Choudhury, Ashish
    Patra, Arpita
    [J]. ACM COMPUTING SURVEYS, 2022, 54 (11S)