메뉴 건너뛰기




Volumn 4392 LNCS, Issue , 2007, Pages 273-290

On secret sharing schemes, matroids and polymatroids

Author keywords

Ideal access structures; Ideal secret sharing schemes; Information rate; Matroids; Polymatroids; Secret sharing

Indexed keywords

DATA STRUCTURES; INFORMATION THEORY; PROBLEM SOLVING;

EID: 38049036249     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70936-7_15     Document Type: Conference Paper
Times cited : (23)

References (39)
  • 1
    • 33644602159 scopus 로고    scopus 로고
    • On the power of nonlinear secret sharing schemes
    • A. Beimel, Y. Ishai. On the power of nonlinear secret sharing schemes. SIAM J. Discrete Math. 19 (2005) 258-280.
    • (2005) SIAM J. Discrete Math , vol.19 , pp. 258-280
    • Beimel, A.1    Ishai, Y.2
  • 2
    • 33745543756 scopus 로고    scopus 로고
    • Third Theory of Cryptography Conference, TCC 2006. Lecture Notes in Comput. Sci
    • 482-501
    • A. Beimel, N. Livne. On Matroids and Non-ideal Secret Sharing. Third Theory of Cryptography Conference, TCC 2006. Lecture Notes in Comput. Sci. 3876 (2006) 482-501.
    • (2006) , vol.3876
    • Beimel, A.1    Livne, N.2
  • 3
    • 24144494482 scopus 로고    scopus 로고
    • Second Theory of Cryptography Conference, TCC 2005. Lecture Notes in Comput. Sci
    • 600-619
    • A. Beimel, T. Tassa, E. Weinreb. Characterizing Ideal Weighted Threshold Secret Sharing. Second Theory of Cryptography Conference, TCC 2005. Lecture Notes in Comput. Sci. 3378 (2005) 600-619.
    • (2005) , vol.3378
    • Beimel, A.1    Tassa, T.2    Weinreb, E.3
  • 4
    • 27144471932 scopus 로고    scopus 로고
    • Separating the power of monotone span programs over different fields
    • A. Beimel, E. Weinreb. Separating the power of monotone span programs over different fields. SIAM J. Comput. 34 (2005) 1196-1215.
    • (2005) SIAM J. Comput , vol.34 , pp. 1196-1215
    • Beimel, A.1    Weinreb, E.2
  • 5
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • G.R. Blakley. Safeguarding cryptographic keys. AFIPS Conference Proceedings. 48 (1979) 313-317.
    • (1979) AFIPS Conference Proceedings , vol.48 , pp. 313-317
    • Blakley, G.R.1
  • 7
    • 85028751599 scopus 로고
    • On the information rate of secret sharing schemes. Advances in Cryptology - CRYPTO'92
    • C. Blundo, A. De Santis, L. Gargano, U. Vaccaro. On the information rate of secret sharing schemes. Advances in Cryptology - CRYPTO'92. Lecture Notes in Comput. Sci. 740 (1993) 148-167.
    • (1993) Lecture Notes in Comput. Sci , vol.740 , pp. 148-167
    • Blundo, C.1    De Santis, A.2    Gargano, L.3    Vaccaro, U.4
  • 10
    • 0000849681 scopus 로고
    • On the classification of ideal secret sharing schemes
    • E.F. Brickell, D.M. Davenport. On the classification of ideal secret sharing schemes. J. Cryptology 4 (1991) 123-134.
    • (1991) J. Cryptology , vol.4 , pp. 123-134
    • Brickell, E.F.1    Davenport, D.M.2
  • 11
    • 0026992660 scopus 로고
    • Some improved bounds on the information rate of perfect secret sharing schemes
    • E.F. Brickell, D.R. Stinson. Some improved bounds on the information rate of perfect secret sharing schemes. J. Cryptology 5 (1992) 153-166.
    • (1992) J. Cryptology , vol.5 , pp. 153-166
    • Brickell, E.F.1    Stinson, D.R.2
  • 13
    • 0001607361 scopus 로고    scopus 로고
    • The size of a share must be large
    • L. Csirmaz. The size of a share must be large. J. Cryptology 10 (1997) 223-231.
    • (1997) J. Cryptology , vol.10 , pp. 223-231
    • Csirmaz, L.1
  • 14
    • 33746337247 scopus 로고    scopus 로고
    • Efficient Construction of the Dual Span Program
    • Manuscript
    • S. Fehr. Efficient Construction of the Dual Span Program. Manuscript.
    • Fehr, S.1
  • 15
    • 0017955317 scopus 로고
    • Entropy functions and polymatroids-combinatorial structures in information theory
    • S. Fujishige. Entropy functions and polymatroids-combinatorial structures in information theory. Electron. Comm. Japan 61 (1978) 14-18.
    • (1978) Electron. Comm. Japan , vol.61 , pp. 14-18
    • Fujishige, S.1
  • 16
    • 0018020371 scopus 로고
    • Polymatroidal Dependence Structure of a Set of Random Variables
    • S. Fujishige. Polymatroidal Dependence Structure of a Set of Random Variables. Information and Control 39 (1978) 55-72.
    • (1978) Information and Control , vol.39 , pp. 55-72
    • Fujishige, S.1
  • 17
  • 18
    • 0023543848 scopus 로고
    • Secret sharing scheme realizing any access structure
    • M. Ito, A. Saito, T. Nishizeki. Secret sharing scheme realizing any access structure. Proc. IEEE Globecom'87 (1987) 99-102.
    • (1987) Proc. IEEE Globecom'87 , pp. 99-102
    • Ito, M.1    Saito, A.2    Nishizeki, T.3
  • 19
    • 0001652944 scopus 로고    scopus 로고
    • Perfect secret sharing schemes on five participants
    • W.-A. Jackson, K.M. Martin. Perfect secret sharing schemes on five participants. Des. Codes Cryptogr. 9 (1996) 267-286.
    • (1996) Des. Codes Cryptogr , vol.9 , pp. 267-286
    • Jackson, W.-A.1    Martin, K.M.2
  • 21
    • 0001530822 scopus 로고
    • A solution of the Shannon switching game
    • A. Lehman. A solution of the Shannon switching game. J. Soc. Indust. Appl. Math. 12 (1964) 687-725.
    • (1964) J. Soc. Indust. Appl. Math , vol.12 , pp. 687-725
    • Lehman, A.1
  • 22
  • 23
    • 5344242549 scopus 로고    scopus 로고
    • Secret sharing schemes on sparse homogeneous access structures with rank three
    • Research Paper 72, 16 pp, electronic
    • J.Martí-Farré, C. Padró. Secret sharing schemes on sparse homogeneous access structures with rank three. Electronic Journal of Combinatorics 11(1) (2004) Research Paper 72, 16 pp. (electronic).
    • (2004) Electronic Journal of Combinatorics , vol.11 , Issue.1
    • Martí-Farré, J.1    Padró, C.2
  • 24
    • 14644407439 scopus 로고    scopus 로고
    • Secret sharing schemes with three or four minimal qualified subsets
    • J. Martí-Farré, C. Padró. Secret sharing schemes with three or four minimal qualified subsets. Des. Codes Cryptogr. 34 (2005) 17-34.
    • (2005) Des. Codes Cryptogr , vol.34 , pp. 17-34
    • Martí-Farré, J.1    Padró, C.2
  • 25
    • 33750012353 scopus 로고    scopus 로고
    • Fifth Conference on Security and Cryptography for Networks, SCN 2006. Lecture Notes in Comput. Sci
    • 201-215
    • J.Martí-Farré, C. Padró. Ideal secret sharing schemes whose minimal qualified subsets have at most three participants. Fifth Conference on Security and Cryptography for Networks, SCN 2006. Lecture Notes in Comput. Sci. 4116 (2006) 201-215.
    • (2006) , vol.4116
    • Martí-Farré, J.1    Padró, C.2
  • 26
    • 32144455532 scopus 로고    scopus 로고
    • Secret sharing schemes on access structures with intersection number equal to one
    • J. Martí-Farré, C. Padró. Secret sharing schemes on access structures with intersection number equal to one. Discrete Applied Mathematics 154 (2006) 552-563.
    • (2006) Discrete Applied Mathematics , vol.154 , pp. 552-563
    • Martí-Farré, J.1    Padró, C.2
  • 27
    • 0345884729 scopus 로고    scopus 로고
    • Matroid representations by partitions
    • F. Matúš. Matroid representations by partitions. Discrete Math. 203 (1999) 169-194.
    • (1999) Discrete Math , vol.203 , pp. 169-194
    • Matúš, F.1
  • 28
    • 23944508637 scopus 로고    scopus 로고
    • Fourth Conference on Security in Communication Networks - SCN 2004. Lecture Notes in Comput. Sci
    • 252-265
    • V. Nikov, S. Nikova, B. Preneel. On the Size of Monotone Span Programs. Fourth Conference on Security in Communication Networks - SCN 2004. Lecture Notes in Comput. Sci. 3352 (2004) 252-265.
    • (2004) , vol.3352
    • Nikov, V.1    Nikova, S.2    Preneel, B.3
  • 29
    • 0004061262 scopus 로고
    • Oxford Science Publications. The Clarendon Press, Oxford University Press, New York
    • J.G. Oxley. Matroid theory. Oxford Science Publications. The Clarendon Press, Oxford University Press, New York, 1992.
    • (1992) Matroid theory
    • Oxley, J.G.1
  • 30
    • 0034315039 scopus 로고    scopus 로고
    • Secret sharing schemes with bipartite access structure
    • C. Padró, G. Sáez. Secret sharing schemes with bipartite access structure. IEEE Trans. Inform. Theory 46 (2000) 2596-2604.
    • (2000) IEEE Trans. Inform. Theory , vol.46 , pp. 2596-2604
    • Padró, C.1    Sáez, G.2
  • 31
    • 0037200862 scopus 로고    scopus 로고
    • Lower bounds on the information rate of secret sharing schemes with homogeneous access structure
    • 345-351. Quoting Marc Heymann Pignolo ¡mheymann@ma4.upc.edu¿
    • C. Padró, G. Sáez. Lower bounds on the information rate of secret sharing schemes with homogeneous access structure. Inform. Process. Lett. 83 (2002) 345-351. Quoting Marc Heymann Pignolo ¡mheymann@ma4.upc.edu¿:
    • (2002) Inform. Process. Lett , vol.83
    • Padró, C.1    Sáez, G.2
  • 32
    • 0039935716 scopus 로고
    • A forbidden minor characterization of matroid ports
    • P.D. Seymour. A forbidden minor characterization of matroid ports. Quart. J. Math. Oxford Ser. 27 (1976) 407-413.
    • (1976) Quart. J. Math. Oxford Ser , vol.27 , pp. 407-413
    • Seymour, P.D.1
  • 33
  • 34
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Commun, of the ACM 22 (1979) 612-613.
    • (1979) Commun, of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 36
    • 0000708528 scopus 로고
    • An explication of secret sharing schemes
    • D.R. Stinson. An explication of secret sharing schemes. Des. Codes Cryptogr. 2 (1992) 357-390.
    • (1992) Des. Codes Cryptogr , vol.2 , pp. 357-390
    • Stinson, D.R.1
  • 37
    • 85028945826 scopus 로고
    • New general lower bounds on the information rate of secret sharing schemes. Advances in Cryptology - CRYPTO'92
    • D.R. Stinson. New general lower bounds on the information rate of secret sharing schemes. Advances in Cryptology - CRYPTO'92. Lecture Notes in Comput. Sci. 740 (1993) 168-182.
    • (1993) Lecture Notes in Comput. Sci , vol.740 , pp. 168-182
    • Stinson, D.R.1
  • 38
    • 0028323999 scopus 로고
    • Decomposition constructions for secret-sharing schemes
    • D.R. Stinson. Decomposition constructions for secret-sharing schemes. IEEE Trans. Inform. Theory 40 (1994) 118-125.
    • (1994) IEEE Trans. Inform. Theory , vol.40 , pp. 118-125
    • Stinson, D.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.