On secret sharing schemes, matroids and polymatroids

被引:0
|
作者
Marti-Farre, Jaume [1 ]
Padro, Caries [1 ]
机构
[1] Univ Politecn Cataluna, Dept Matemat Aplicada, E-08028 Barcelona, Catalonia, Spain
来源
关键词
secret sharing; information rate; ideal secret sharing schemes; ideal access structures; matroids; polymatroids;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the main open problems in secret sharing is the characterization of the access structures of ideal secret sharing schemes. As a consequence of the results by Brickell and Davenport, every one of those access structures is related in a certain way to a unique matroid. Matroid ports are combinatorial objects that are almost equivalent to matroid-related access structures. They were introduced by Lehman in 1964 and a forbidden minor characterization was given by Seymour in 1976. These and other subsequent works on that topic have not been noticed until now by the researchers interested on secret sharing. By combining those results with some techniques in secret sharing, we obtain new characterizations of matroid-related access structures. As a consequence, we generalize the result by Brickell and Davenport by proving that, if the information rate of a secret sharing scheme is greater than 2/3, then its access structure is matroid-related. This generalizes several results that were obtained for particular families of access structures. In addition, we study the use of polymatroids for obtaining upper bounds on the optimal information rate of access structures. We prove that every bound that is obtained by this technique for an access structure applies to its dual structure as well. Finally, we present lower bounds on the optimal information rate of the access structures that are related to two matroids that are not associated with any ideal secret sharing scheme: the Vamos matroid and the non-Desargues matroid.
引用
收藏
页码:273 / +
页数:4
相关论文
共 50 条
  • [31] Matroids can be far from ideal secret sharing
    Beimel, Amos
    Livne, Noam
    Padro, Carles
    THEORY OF CRYPTOGRAPHY, 2008, 4948 : 194 - +
  • [32] Ideal hierarchical secret sharing and lattice path matroids
    Songbao Mo
    Designs, Codes and Cryptography, 2023, 91 : 1335 - 1349
  • [33] Non-representable multipartite secret sharing matroids
    Xu, Jing-Fang
    Cui, Guo-Hua
    Cheng, Qi
    Zeng, Bing
    Tongxin Xuebao/Journal on Communication, 2009, 30 (08): : 21 - 26
  • [34] Visual secret sharing schemes for plural secret images
    Iwamoto, M
    Yamamoto, H
    2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 283 - 283
  • [35] Verifiable Secret Redistribution for Proactive Secret Sharing Schemes
    于佳
    孔凡玉
    李大兴
    JournalofShanghaiJiaotongUniversity(Science), 2006, (02) : 236 - 241
  • [36] On general perfect secret sharing schemes
    Blakley, GR
    Kabatianski, GA
    ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 367 - 371
  • [37] Security of Selected Secret Sharing Schemes
    Ogiela, Urszula
    Takizawa, Makoto
    Ogiela, Lidia
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2017, 2018, 612 : 395 - 400
  • [38] Toric ideals of lattice path matroids and polymatroids
    Schweig, Jay
    JOURNAL OF PURE AND APPLIED ALGEBRA, 2011, 215 (11) : 2660 - 2665
  • [39] Fully dynamic secret sharing schemes
    Universita di Salerno, Baronissi, Italy
    Theor Comput Sci, 2 (407-440):
  • [40] Veto is impossible in secret sharing schemes
    Tokyo Institute of Technology, 2-12-1 Ookayama, Meguro-ku, Tokyo 152, Japan
    Inf. Process. Lett., 6 (293-295):