Skip to main content

Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants

  • Conference paper
Security and Cryptography for Networks (SCN 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4116))

Included in the following conference series:

Abstract

One of the main open problems in secret sharing is the characterization of the access structures of ideal secret sharing schemes. As a consequence of the results by Brickell and Davenport, every one of those access structures is related in a certain way to a unique matroid. We study this open problem for access structures with rank three, that is, structures whose minimal qualified subsets have at most three participants. We prove that all access structures with rank three that are related to matroids with rank greater than three are ideal. After the results in this paper, the only open problem in the characterization of the ideal access structures with rank three is to characterize the matroids with rank three that can be represented by an ideal secret sharing scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Beimel, A., Livne, N.: On Matroids and Non-ideal Secret Sharing. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 482–501. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  2. Beimel, A., Tassa, T., Weinreb, E.: Characterizing Ideal Weighted Threshold Secret Sharing. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 600–619. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. Blakley, G.R.: Safeguarding cryptographic keys. In: AFIPS Conference Proceedings, vol. 48, pp. 313–317 (1979)

    Google Scholar 

  4. Blundo, C., De Santis, A., De Simone, R., Vaccaro, U.: Tight bounds on the information rate of secret sharing schemes. Des. Codes Cryptogr. 11, 107–122 (1997)

    Article  MATH  MathSciNet  Google Scholar 

  5. Blundo, C., De Santis, A., Gargano, L., Vaccaro, U.: On the information rate of secret sharing schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 148–167. Springer, Heidelberg (1993)

    Google Scholar 

  6. Brickell, E.F.: Some ideal secret sharing schemes. J. Combin. Math. and Combin. Comput. 9, 105–113 (1989)

    MathSciNet  Google Scholar 

  7. Brickell, E.F., Davenport, D.M.: On the classification of ideal secret sharing schemes. J. Cryptology 4, 123–134 (1991)

    MATH  Google Scholar 

  8. Capocelli, R.M., De Santis, A., Gargano, L., Vaccaro, U.: On the size of shares of secret sharing schemes. J. Cryptology 6, 157–168 (1993)

    Article  MATH  Google Scholar 

  9. Csirmaz, L.: The size of a share must be large. J. Cryptology 10, 223–231 (1997)

    Article  MATH  MathSciNet  Google Scholar 

  10. Jackson, W.-A., Martin, K.M.: Perfect secret sharing schemes on five participants. Des. Codes Cryptogr. 9, 267–286 (1996)

    MATH  MathSciNet  Google Scholar 

  11. Karnin, E.D., Greene, J.W., Hellman, M.E.: On secret sharing systems. IEEE Trans. Inform. Theory 29, 35–41 (1983)

    Article  MATH  MathSciNet  Google Scholar 

  12. Lehman, A.: A solution of the Shannon switching game. J. Soc. Indust. Appl. Math. 12, 687–725 (1964)

    Article  MATH  MathSciNet  Google Scholar 

  13. Lehman, A.: Matroids and Ports. Notices Amer. Math. Soc. 12, 356–360 (1976)

    Google Scholar 

  14. Martí-Farré, J., Padró, C.: Secret sharing schemes on sparse homogeneous access structures with rank three. Electronic Journal of Combinatorics 11(1) (2004); Research Paper 72, p. 16 (electronic)

    Google Scholar 

  15. Martí-Farré, J., Padró, C.: Secret sharing schemes with three or four minimal qualified subsets. Des. Codes Cryptogr. 34, 17–34 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  16. Martí-Farré, J., Padró, C.: Secret sharing schemes on access structures with intersection number equal to one. Discrete Appl. Math. 154, 552–563 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  17. Martí-Farré, J., Padró, C.: On Secret Sharing Schemes, Matroids and Polymatroids. Cryptology ePrint Archive, Report 2006/077 (preprint), Available at: http://eprint.iacr.org/2006/077

  18. Matúš, F.: Matroid representations by partitions. Discrete Math. 203, 169–194 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  19. Oxley, J.G.: Matroid theory. Oxford Science Publications. The Clarendon Press / Oxford University Press, New York (1992)

    Google Scholar 

  20. Padró, C., Sáez, G.: Secret sharing schemes with bipartite access structure. IEEE Trans. Inform. Theory 46, 2596–2604 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  21. Padró, C., Sáez, G.: Lower bounds on the information rate of secret sharing schemes with homogeneous access structure. Inform. Process. Lett. 83, 345–351 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  22. Seymour, P.D.: A forbidden minor characterization of matroid ports. Quart. J. Math. Oxford Ser. 27, 407–413 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  23. Seymour, P.D.: On secret-sharing matroids. J. Combin. Theory Ser. B 56, 69–73 (1992)

    Article  MATH  MathSciNet  Google Scholar 

  24. Shamir, A.: How to share a secret. Commun. of the ACM 22, 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  25. Simonis, J., Ashikhmin, A.: Almost affine codes. Des. Codes Cryptogr. 14, 179–197 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  26. Stinson, D.R.: An explication of secret sharing schemes. Des. Codes Cryptogr. 2, 357–390 (1992)

    Article  MATH  MathSciNet  Google Scholar 

  27. Stinson, D.R.: New general lower bounds on the information rate of secret sharing schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 168–182. Springer, Heidelberg (1993)

    Google Scholar 

  28. Stinson, D.R.: Decomposition constructions for secret-sharing schemes. IEEE Trans. Inform. Theory 40, 118–125 (1994)

    Article  MATH  MathSciNet  Google Scholar 

  29. Welsh, D.J.A.: Matroid Theory. Academic Press, London (1976)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Martí-Farré, J., Padró, C. (2006). Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants. In: De Prisco, R., Yung, M. (eds) Security and Cryptography for Networks. SCN 2006. Lecture Notes in Computer Science, vol 4116. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11832072_14

Download citation

  • DOI: https://doi.org/10.1007/11832072_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38080-1

  • Online ISBN: 978-3-540-38081-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics