Theory of Cryptography
DOI: 10.1007/978-3-540-70936-7_15
|View full text |Cite
|
Sign up to set email alerts
|

On Secret Sharing Schemes, Matroids and Polymatroids

Abstract: The complexity of a secret sharing scheme is defined as the ratio between the maximum length of the shares and the length of the secret. The optimization of this parameter for general access structures is an important and very difficult open problem in secret sharing. We explore in this paper the connections of this open problem with matroids and polymatroids.Matroid ports were introduced by Lehman in 1964. A forbidden minor characterization of matroid ports was given by Seymour in 1976. These results are prev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
91
0

Publication Types

Select...
5
1

Relationship

5
1

Authors

Journals

citations
Cited by 39 publications
(94 citation statements)
references
References 51 publications
3
91
0
Order By: Relevance
“…troids, the characterization of the ideal multipartite access structures is studied in this paper in all generality. Even though polymatroids have been used before in secret sharing [11,25], in this paper integer polymatroids are used for the first time in the characterization of ideal access structures. These combinatorial objects are proved to be a very useful tool to study multipartite matroids, which are the ones defined from ideal multipartite secret sharing schemes.…”
Section: Introductionmentioning
confidence: 99%
“…troids, the characterization of the ideal multipartite access structures is studied in this paper in all generality. Even though polymatroids have been used before in secret sharing [11,25], in this paper integer polymatroids are used for the first time in the characterization of ideal access structures. These combinatorial objects are proved to be a very useful tool to study multipartite matroids, which are the ones defined from ideal multipartite secret sharing schemes.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, the aforementioned connection between minors and secret sharing implies that σ(Γ ) ≤ σ(Γ ) and λ(Γ ) ≤ λ(Γ ). The parameters λ and κ are invariant by duality, as it was proved, respectively, in [27] and [29]. The relation between σ(Γ ) and σ(Γ * ) is an open problem.…”
Section: Duality and Minorsmentioning
confidence: 88%
“…We use the description of this method presented in [29], which is in terms of polymatroids, to obtain bounds on the information rate of bipartite access structures. We present these bounds in Section 5.…”
Section: Theorem 1 ([29])mentioning
confidence: 99%
See 2 more Smart Citations