1998
DOI: 10.1023/a:1008244215660
|View full text |Cite
|
Sign up to set email alerts
|

Untitled

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
29
0

Year Published

2005
2005
2015
2015

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 78 publications
(29 citation statements)
references
References 9 publications
0
29
0
Order By: Relevance
“…On the other hand, the columns labelled by 1, 2, g 1 are dependent, thus, they lie on a line. Figure 2 is not linearly representable over any field [28, Proposition 6.1.10], but has a 2-linear representation over F 3 [35]. Therefore, the Non-Pappus matroid is 2-minimally representable.…”
Section: The Rank Of the Matroid Is Defined R(m ) := R(e) A Base Of mentioning
confidence: 99%
See 3 more Smart Citations
“…On the other hand, the columns labelled by 1, 2, g 1 are dependent, thus, they lie on a line. Figure 2 is not linearly representable over any field [28, Proposition 6.1.10], but has a 2-linear representation over F 3 [35]. Therefore, the Non-Pappus matroid is 2-minimally representable.…”
Section: The Rank Of the Matroid Is Defined R(m ) := R(e) A Base Of mentioning
confidence: 99%
“…However, not all access structures induced by matroids are ideal [32] [25]. The class of matroids inducing ideal access structures are called secret-sharing matroids and also almost affinely representable, and discussed in [35]. Every multilinearly representable matroid is a secret-sharing matroid.…”
Section: Ideal Secret-sharing Schemes and Matroidsmentioning
confidence: 99%
See 2 more Smart Citations
“…The access structure of the scheme is then determined by the matroid associated to the code. The connection between ideal secret sharing schemes and matroids, which applies to non-linear schemes as well, was discovered by Brickell and Davenport [4] and has been studied afterwards in may other works, being [17,16,12, 2] some of them. It plays a key role in one of the main open problems in secret sharing: the characterization of the access structures of ideal secret sharing schemes.…”
Section: Ideal Multiplicative Linear Secret Sharing Schemesmentioning
confidence: 99%