On matroids and non-ideal secret sharing

被引:0
|
作者
Beimel, A [1 ]
Livne, N [1 ]
机构
[1] Ben Gurion Univ Negev, Dept Comp Sci, IL-84105 Beer Sheva, Israel
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret-sharing schemes are a tool used in many cryptographic protocols. In these schemes, a dealer holding a secret string distributes shares to the parties such that only authorized subsets of participants can reconstruct the secret from their shares. The collection of authorized sets is called an access structure. An access structure is ideal if there is a secret-sharing scheme realizing it such that the shares are taken from the same domain as the secrets. Brickell and Davenport (J. of Cryptology, 1991) have shown that ideal access structures are closely related to matroids. They give a necessaxy condition for an access structure to be ideal - the access structure must be induced by a matroid. Seymour (J. of Combinatorial Theory B, 1992) showed that the necessary condition is not sufficient: There exists an access structure induced by a matroid that does not have an ideal scheme. In this work we continue the research on access structures induced by matroids. Our main result in this paper is strengthening the result of Seymour. We show that in any secret sharing scheme realizing the access structure induced by the Vamos matroid with domain of the secrets of size k, the size of the domain of the shares is at least k + Omega(root k). Our second result considers non-ideal secret sharing schemes realizing access structures induced by matroids. We prove that the fact that an access structure is induced by a matroid implies lower and upper bounds on the size of the domain of shares of subsets of paxticipants even in nonideal schemes (this generalized results of Brickell and Davenport for ideal schemes).
引用
收藏
页码:482 / 501
页数:20
相关论文
共 50 条
  • [1] On the Composition of Matroids and Ideal Secret Sharing Schemes
    Siaw-Lynn Ng
    Michael Walker
    [J]. Designs, Codes and Cryptography, 2001, 24 : 49 - 67
  • [2] On the composition of matroids and ideal secret sharing schemes
    Ng, SL
    Walker, M
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2001, 24 (01) : 49 - 67
  • [3] Ideal hierarchical secret sharing and lattice path matroids
    Mo, Songbao
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2022, 91 (4) : 1335 - 1349
  • [4] Ideal hierarchical secret sharing and lattice path matroids
    Songbao Mo
    [J]. Designs, Codes and Cryptography, 2023, 91 : 1335 - 1349
  • [5] Matroids can be far from ideal secret sharing
    Beimel, Amos
    Livne, Noam
    Padro, Carles
    [J]. THEORY OF CRYPTOGRAPHY, 2008, 4948 : 194 - +
  • [6] On Non-representable Secret Sharing Matroids
    Cheng, Qi
    Yin, Yong
    Mao, Kun
    Hsu, Ching-Fang
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 124 - +
  • [7] Non-representable multipartite secret sharing matroids
    Xu, Jing-Fang
    Cui, Guo-Hua
    Cheng, Qi
    Zeng, Bing
    [J]. Tongxin Xuebao/Journal on Communication, 2009, 30 (08): : 21 - 26
  • [8] Multipartite matroids and secret sharing
    HSU ChingFang
    [J]. Chinese Science Bulletin., 2010, 55 (29) - 3266
  • [9] On matroids and nonideal secret sharing
    Beimel, Amos
    Livne, Noam
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2626 - 2643
  • [10] Multipartite matroids and secret sharing
    Hsu ChingFang
    Tang XueMing
    Cheng Qi
    Xiao HaiJun
    [J]. CHINESE SCIENCE BULLETIN, 2010, 55 (29): : 3261 - 3266