Ideal secret sharing schemes whose minimal qualified subsets have at most three participants

被引:18
|
作者
Marti-Farre, Jaume [1 ]
Padro, Carles [1 ]
机构
[1] Univ Politecn Cataluna, Dep Matemat Aplicada 4, Barcelona, Spain
关键词
Secret sharing; Ideal secret sharing schemes; Ideal access structures; Matroid theory; Matroid ports;
D O I
10.1007/s10623-008-9264-9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the main open problems in secret sharing is the characterization of the access structures of ideal secret sharing schemes. Brickell and Davenport proved that every one of these ideal access structures is related in a certain way to a unique matroid. Specifically, they are matroid ports. In addition to the search of general results, this difficult open problem has been studied in previous works for several families of access structures. In this paper we do the same for access structures with rank 3, that is, structures whose minimal qualified subsets have at most three participants. We completely characterize and classify the rank-3 access structures that are matroid ports. We prove that all access structures with rank three that are ports of matroids greater than 3 are ideal. After the results in this paper, the only open problem in the characterization of the ideal access structures with rank three is to characterize the rank-3 matroids that can be represented by an ideal secret sharing scheme.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 50 条
  • [41] Secret sharing schemes for infinite sets of participants: A new design technique
    D'Arco, Paolo
    De Prisco, Roberto
    De Santis, Alfredo
    [J]. THEORETICAL COMPUTER SCIENCE, 2021, 859 : 149 - 161
  • [42] Perfect secret sharing schemes for graph access structures on six participants
    Gharahi, Motahhareh
    Dehkordi, Massoud Hadian
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2013, 7 (02) : 143 - 146
  • [43] A flaw in the use of minimal defining sets for secret sharing schemes
    Grannell, Mike J.
    Griggs, Terry S.
    Penfold Street, Anne
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2006, 40 (02) : 225 - 236
  • [44] Ideal and Computationally Perfect Secret Sharing Schemes for Generalized Access Structures
    Pattipati, Dileep Kumar
    Tentu, Appala Naidu
    Venkaiah, V. Ch.
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 149 - 161
  • [45] Optimal linear secret sharing schemes for graph access structures on six participants
    Gharahi, Motahhareh
    Khazaei, Shahram
    [J]. THEORETICAL COMPUTER SCIENCE, 2019, 771 : 1 - 8
  • [46] Secret sharing schemes from three classes of linear codes
    Yuan, J
    Ding, CS
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (01) : 206 - 212
  • [47] A note on secret sharing schemes with three homogeneous access structure
    Marti-Farre, Jaume
    [J]. INFORMATION PROCESSING LETTERS, 2007, 102 (04) : 133 - 137
  • [48] Some hypersurfaces over finite fields, minimal codes and secret sharing schemes
    Aguglia, Angela
    Ceria, Michela
    Giuzzi, Luca
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (06) : 1503 - 1519
  • [49] Some hypersurfaces over finite fields, minimal codes and secret sharing schemes
    Angela Aguglia
    Michela Ceria
    Luca Giuzzi
    [J]. Designs, Codes and Cryptography, 2022, 90 : 1503 - 1519
  • [50] Three-level secret sharing schemes from the twisted cubic
    Giulietti, Massimo
    Vincenti, Rita
    [J]. DISCRETE MATHEMATICS, 2010, 310 (22) : 3236 - 3240