2007
DOI: 10.1109/tit.2006.887090
|View full text |Cite
|
Sign up to set email alerts
|

Two Constructions on Limits of Entropy Functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
91
0

Year Published

2007
2007
2016
2016

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 68 publications
(91 citation statements)
references
References 39 publications
0
91
0
Order By: Relevance
“…The quasi-matroid V|P 0 = (P ∪{p 0 }, f ) satisfies that f ({p 0 }) = f (P i ) = 2, and f (P i ∪ P j ) = f ({p 0 } ∪ P j ) = 3 except for r({p 0 } ∪ P 3 ) = 4, and f (P 1 ∪ P 2 ∪ P 3 ) = 4. By using information inequalities, it can be proved that such a polymatroid is not the multiple of any entropic polymatroid [23]. Therefore, the quasi-matroid V|P 0 is not a Σ-polymatroid for any secret sharing scheme Σ.…”
Section: Examplesmentioning
confidence: 99%
See 1 more Smart Citation
“…The quasi-matroid V|P 0 = (P ∪{p 0 }, f ) satisfies that f ({p 0 }) = f (P i ) = 2, and f (P i ∪ P j ) = f ({p 0 } ∪ P j ) = 3 except for r({p 0 } ∪ P 3 ) = 4, and f (P 1 ∪ P 2 ∪ P 3 ) = 4. By using information inequalities, it can be proved that such a polymatroid is not the multiple of any entropic polymatroid [23]. Therefore, the quasi-matroid V|P 0 is not a Σ-polymatroid for any secret sharing scheme Σ.…”
Section: Examplesmentioning
confidence: 99%
“…These techniques provided a characterization of the hierarchical access structures that admit an ideal perfect secret sharing scheme [12]. Other relevant results on secret sharing have been obtained by using matroid theory as, for instance, the ones in [2,9,13,23].…”
Section: Introductionmentioning
confidence: 99%
“…It is not difficult to check that S is Π-partite with Π = ({a, b}, {c, d}). Matúš [32] pointed out that the rank function of S violates the non-Shannon information inequality given by Zhang and Yeung [43]. This implies that S is not entropic.…”
Section: Propositionmentioning
confidence: 99%
“…At this point, the remaining open question about the characterization of ideal access structures is determining the matroids that can be defined from ideal secret sharing schemes. Some important results, ideas and techniques to solve this question have been given by Matúš [21,22].…”
Section: Introductionmentioning
confidence: 99%