Ideal secret sharing schemes whose minimal qualified subsets have at most three participants

被引:18
|
作者
Marti-Farre, Jaume [1 ]
Padro, Carles [1 ]
机构
[1] Univ Politecn Cataluna, Dep Matemat Aplicada 4, Barcelona, Spain
关键词
Secret sharing; Ideal secret sharing schemes; Ideal access structures; Matroid theory; Matroid ports;
D O I
10.1007/s10623-008-9264-9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the main open problems in secret sharing is the characterization of the access structures of ideal secret sharing schemes. Brickell and Davenport proved that every one of these ideal access structures is related in a certain way to a unique matroid. Specifically, they are matroid ports. In addition to the search of general results, this difficult open problem has been studied in previous works for several families of access structures. In this paper we do the same for access structures with rank 3, that is, structures whose minimal qualified subsets have at most three participants. We completely characterize and classify the rank-3 access structures that are matroid ports. We prove that all access structures with rank three that are ports of matroids greater than 3 are ideal. After the results in this paper, the only open problem in the characterization of the ideal access structures with rank three is to characterize the rank-3 matroids that can be represented by an ideal secret sharing scheme.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 50 条
  • [41] A Flaw in the Use of Minimal Defining Sets for Secret Sharing Schemes
    Mike J. Grannell
    Terry S. Griggs
    Anne Penfold Street
    Designs, Codes and Cryptography, 2006, 40 : 225 - 236
  • [42] Improvement of Information Rates for Specified Participants in General Secret Sharing Schemes
    Tochikubo, Kouya
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [43] Secret sharing schemes for infinite sets of participants: A new design technique
    D'Arco, Paolo
    De Prisco, Roberto
    De Santis, Alfredo
    THEORETICAL COMPUTER SCIENCE, 2021, 859 : 149 - 161
  • [44] Perfect secret sharing schemes for graph access structures on six participants
    Gharahi, Motahhareh
    Dehkordi, Massoud Hadian
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2013, 7 (02) : 143 - 146
  • [45] A flaw in the use of minimal defining sets for secret sharing schemes
    Grannell, Mike J.
    Griggs, Terry S.
    Penfold Street, Anne
    DESIGNS CODES AND CRYPTOGRAPHY, 2006, 40 (02) : 225 - 236
  • [46] Ideal and Computationally Perfect Secret Sharing Schemes for Generalized Access Structures
    Pattipati, Dileep Kumar
    Tentu, Appala Naidu
    Venkaiah, V. Ch.
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 149 - 161
  • [47] Optimal linear secret sharing schemes for graph access structures on six participants
    Gharahi, Motahhareh
    Khazaei, Shahram
    THEORETICAL COMPUTER SCIENCE, 2019, 771 : 1 - 8
  • [48] Secret sharing schemes from three classes of linear codes
    Yuan, J
    Ding, CS
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (01) : 206 - 212
  • [49] A note on secret sharing schemes with three homogeneous access structure
    Marti-Farre, Jaume
    INFORMATION PROCESSING LETTERS, 2007, 102 (04) : 133 - 137
  • [50] Some hypersurfaces over finite fields, minimal codes and secret sharing schemes
    Aguglia, Angela
    Ceria, Michela
    Giuzzi, Luca
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (06) : 1503 - 1519