Ideal secret sharing schemes whose minimal qualified subsets have at most three participants

被引:18
|
作者
Marti-Farre, Jaume [1 ]
Padro, Carles [1 ]
机构
[1] Univ Politecn Cataluna, Dep Matemat Aplicada 4, Barcelona, Spain
关键词
Secret sharing; Ideal secret sharing schemes; Ideal access structures; Matroid theory; Matroid ports;
D O I
10.1007/s10623-008-9264-9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the main open problems in secret sharing is the characterization of the access structures of ideal secret sharing schemes. Brickell and Davenport proved that every one of these ideal access structures is related in a certain way to a unique matroid. Specifically, they are matroid ports. In addition to the search of general results, this difficult open problem has been studied in previous works for several families of access structures. In this paper we do the same for access structures with rank 3, that is, structures whose minimal qualified subsets have at most three participants. We completely characterize and classify the rank-3 access structures that are matroid ports. We prove that all access structures with rank three that are ports of matroids greater than 3 are ideal. After the results in this paper, the only open problem in the characterization of the ideal access structures with rank three is to characterize the rank-3 matroids that can be represented by an ideal secret sharing scheme.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 50 条
  • [31] Ideal and perfect multi-secret sharing schemes whose access structure are Q3
    Lv Yingli
    Xu Xiaojun
    Zhang Xiaofeng
    Zhang Lianlian
    [J]. 2012 8TH INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORKING TECHNOLOGY (ICCNT, INC, ICCIS AND ICMIC), 2012, : 21 - 25
  • [32] Ideal secret sharing schemes with multipartite access structures
    Ng, SL
    [J]. IEE PROCEEDINGS-COMMUNICATIONS, 2006, 153 (02): : 165 - 168
  • [33] REDUCED ACCESS STRUCTURES WITH FOUR MINIMAL QUALIFIED SUBSETS ON SIX PARTICIPANTS
    Gharahi, Motahhareh
    Khazaei, Shahram
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2018, 12 (01) : 199 - 214
  • [34] A Construction Method of Secret Sharing Schemes Based on Authorized Subsets
    Tochikubo, Kouya
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 394 - 399
  • [35] Optimal Multiple Assignment Schemes Using Ideal Multipartite Secret Sharing Schemes
    Eriguchi, Reo
    Kunihiro, Noboru
    Iwamoto, Mitsugu
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 3047 - 3051
  • [36] Ideal homomorphic secret sharing schemes over cyclic groups
    Mulan Liu
    Zhanfei Zhou
    [J]. Science in China Series E: Technological Sciences, 1998, 41 : 650 - 660
  • [37] Ideal homomorphic secret sharing schemes over cyclic groups
    刘木兰
    周展飞
    [J]. Science China Technological Sciences, 1998, (06) : 650 - 660
  • [38] Ideal homomorphic secret sharing schemes over cyclic groups
    Liu, ML
    Zhou, ZF
    [J]. SCIENCE IN CHINA SERIES E-TECHNOLOGICAL SCIENCES, 1998, 41 (06): : 650 - 660
  • [39] A Flaw in the Use of Minimal Defining Sets for Secret Sharing Schemes
    Mike J. Grannell
    Terry S. Griggs
    Anne Penfold Street
    [J]. Designs, Codes and Cryptography, 2006, 40 : 225 - 236
  • [40] Improvement of Information Rates for Specified Participants in General Secret Sharing Schemes
    Tochikubo, Kouya
    [J]. 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,