Advances in Cryptology — CRYPTO’ 89 Proceedings
DOI: 10.1007/0-387-34805-0_25
|View full text |Cite
|
Sign up to set email alerts
|

On the Classification of Ideal Secret Sharing Schemes

Abstract: In a secret sharing scheme, a dealer has a secret key. There is a tit&et P of participants and a set I' of subsets of P. A secret sharing scheme with I' as the access structure is a method which the dealer can use to distribute shares to each participant so that a subset of participants can determine the key if and only if that subset is in I'. The share of a participant is the information sent by the dealer in private to the participant. A secret sharing scheme is ideal if any subset of participants who can u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

4
208
0

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 100 publications
(212 citation statements)
references
References 2 publications
4
208
0
Order By: Relevance
“…The characterization of the ideal access structures has attracted the attention of many researchers. Brickell and Davenport [13] discovered strong connections of this open problem with matroid theory. Specifically, every ideal secret sharing scheme defines a unique matroid, and hence ideal secret sharing schemes can be seen as representations of matroids that actually include linear representations because of the construction of ideal linear schemes proposed by Brickell [12].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The characterization of the ideal access structures has attracted the attention of many researchers. Brickell and Davenport [13] discovered strong connections of this open problem with matroid theory. Specifically, every ideal secret sharing scheme defines a unique matroid, and hence ideal secret sharing schemes can be seen as representations of matroids that actually include linear representations because of the construction of ideal linear schemes proposed by Brickell [12].…”
Section: Introductionmentioning
confidence: 99%
“…Surprisingly enough, the authors interested on secret sharing have been unaware until recently that the result by Brickell and Davenport [13] can be stated in terms of matroid ports, a combinatorial object that was introduced by Lehman [28] in 1964 to solve the Shannon switching game. Actually, after a small change in the definition of matroid port to adapt it to our topic, the main result in [13] can be rewritten as follows: every ideal access structure is a matroid port.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…All other ideal weighted threshold access structures can be obtained by combining the indecomposable ones using the operation of composition defined by Beimel et al (2008). Their proof was indirect, the cornerstone of their approach was an application of the well-known connection between ideal secret sharing schemes and matroids (Brickell and Davenport, 1990).…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, Csirmaz [5] proved that there are access structures on n elements so that any perfect secret sharing scheme must assign a share which is of size at least -times the size of the secret k. n log n We have better upper bounds when the access structure is based on graphs. If, for example, the graph on which the access structure is based is complete multipartite, then there exists an ideal perfect secret sharing scheme for A (see [3]) and the size of the shares becomes log ISl/pmax + log IKI. Otherwise, using bounds found in [17] we can say that log IV,l 5 log IKl(A + 1)/2, where A is the maximum degree of the graph.…”
mentioning
confidence: 99%