메뉴 건너뛰기




Volumn 4, Issue 2, 2010, Pages 95-120

On secret sharing schemes, matroids and polymatroids

Author keywords

Ideal secret sharing schemes; Matroids; Optimization of secret sharing schemes for general access structures; Polymatroids; Secret sharing

Indexed keywords


EID: 79959310457     PISSN: 18622976     EISSN: 18622984     Source Type: Journal    
DOI: 10.1515/JMC.2010.004     Document Type: Article
Times cited : (39)

References (48)
  • 1
    • 33644602159 scopus 로고    scopus 로고
    • On the power of nonlinear secret sharing schemes
    • A. Beimel and Y. Ishai, On the power of nonlinear secret sharing schemes, SIAM J. Discrete Math. 19 (2005), 258-280.
    • (2005) SIAM J. Discrete Math. , vol.19 , pp. 258-280
    • Beimel, A.1    Ishai, Y.2
  • 5
    • 24144494482 scopus 로고    scopus 로고
    • Characterizing ideal weighted threshold secret sharing
    • Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
    • A. Beimel, T. Tassa, and E. Weinreb, Characterizing Ideal Weighted Threshold Secret Sharing, Second Theory of Cryptography Conference, TCC 2005, Lecture Notes in Comput. Sci. 3378 (2005), 600-619. (Pubitemid 41231185)
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 600-619
    • Beimel, A.1    Tassa, T.2    Weinreb, E.3
  • 6
    • 27144471932 scopus 로고    scopus 로고
    • Separating the power of monotone span programs over different fields
    • DOI 10.1137/S0097539704444038
    • A. Beimel and E. Weinreb, Separating the power of monotone span programs over different fields, SIAM J. Comput. 34 (2005), 1196-1215. (Pubitemid 41495292)
    • (2005) SIAM Journal on Computing , vol.34 , Issue.5 , pp. 1196-1215
    • Beimel, A.1    Weinreb, E.2
  • 8
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • G. R. Blakley, Safeguarding cryptographic keys, AFIPS Conference Proceedings 48 (1979), 313-317.
    • (1979) AFIPS Conference Proceedings , vol.48 , pp. 313-317
    • Blakley, G.R.1
  • 14
    • 0000849681 scopus 로고
    • On the classification of ideal secret sharing schemes
    • E. F. Brickell and D.M. Davenport, On the classification of ideal secret sharing schemes, J. Cryptology 4 (1991), 123-134.
    • (1991) J. Cryptology , vol.4 , pp. 123-134
    • Brickell, E.F.1    Davenport, D.M.2
  • 15
    • 0026992660 scopus 로고
    • Some improved bounds on the information rate of perfect secret sharing schemes
    • E. F. Brickell and D. R. Stinson, Some improved bounds on the information rate of perfect secret sharing schemes, J. Cryptology 5 (1992), 153-166. (Pubitemid 23607284)
    • (1992) Journal of Cryptology , vol.5 , Issue.3 , pp. 153-166
    • Brickell, E.F.1    Stinson, D.R.2
  • 18
    • 0001607361 scopus 로고    scopus 로고
    • The size of a share must be large
    • L. Csirmaz, The size of a share must be large, J. Cryptology 10 (1997), 223-231. (Pubitemid 127754573)
    • (1997) Journal of Cryptology , vol.10 , Issue.4 , pp. 223-231
    • Csirmaz, L.1
  • 19
    • 33744546371 scopus 로고    scopus 로고
    • Improved constructions of secret sharing schemes by applying decompositions
    • DOI 10.1016/j.ipl.2006.01.016, PII S0020019006001116
    • M. van Dijk, T. Kevenaar, G. Schrijen, and P. Tuyls, Improved constructions of secret sharing schemes by applying .-decompositions, Inf. Process. Lett. 99 (2006), 154-157. (Pubitemid 43816995)
    • (2006) Information Processing Letters , vol.99 , Issue.4 , pp. 154-157
    • Van Dijk, M.1    Kevenaar, T.2    Schrijen, G.-J.3    Tuyls, P.4
  • 22
    • 0017955317 scopus 로고
    • Entropy functions and polymatroids-combinatorial structures in information theory
    • S. Fujishige, Entropy functions and polymatroids-combinatorial structures in information theory, Electron. Comm. Japan 61 (1978), 14-18. (Pubitemid 10441095)
    • (1978) Electronics & communications in Japan , vol.61 , Issue.4 , pp. 14-18
    • Fujishige, S.1
  • 23
    • 0018020371 scopus 로고
    • Polymatroidal dependence structure of a set of random variables
    • S. Fujishige, Polymatroidal Dependence Structure of a Set of Random Variables, Information and Control 39 (1978), 55-72. (Pubitemid 9408951)
    • (1978) Inf Control , vol.39 , Issue.1 , pp. 55-72
    • Fujishige, S.1
  • 25
    • 0023543848 scopus 로고
    • Secret sharing scheme realizing any access structure
    • M. Ito, A. Saito, and T. Nishizeki, Secret sharing scheme realizing any access structure, Proc. IEEE Globecom'87 (1987), 99-102. (Pubitemid 18628648)
    • (1987) Proc. IEEE Globecom'87 , pp. 99-102
    • Ito, M.1    Saito, A.2    Nishizeki, T.3
  • 26
    • 0013483720 scopus 로고
    • Geometric secret sharing schemes and their duals
    • W.-A. Jackson and K. M. Martin, Geometric secret sharing schemes and their duals, Des. Codes Cryptogr. 4 (1994), 83-95.
    • (1994) Des. Codes Cryptogr. , vol.4 , pp. 83-95
    • Jackson, W.-A.1    Martin, K.M.2
  • 27
    • 0001652944 scopus 로고    scopus 로고
    • Perfect secret sharing schemes on five participants
    • W.-A. Jackson and K. M. Martin, Perfect secret sharing schemes on five participants, Des. Codes Cryptogr. 9 (1996), 267-286. (Pubitemid 126708419)
    • (1996) Designs, Codes, and Cryptography , vol.9 , Issue.3 , pp. 267-286
    • Jackson, W.-A.1    Martin, K.M.2
  • 29
    • 0001530822 scopus 로고
    • A solution of the Shannon switching game
    • A. Lehman, A solution of the Shannon switching game, J. Soc. Indust. Appl. Math. 12 (1964), 687-725.
    • (1964) J. Soc. Indust. Appl. Math. , vol.12 , pp. 687-725
    • Lehman, A.1
  • 32
    • 14644407439 scopus 로고    scopus 로고
    • Secret sharing schemes with three or four minimal qualified subsets
    • DOI 10.1007/s10623-003-4192-1, PIPS5384192
    • J. Martí-Farré and C. Padró, Secret sharing schemes with three or four minimal qualified subsets, Des. Codes Cryptogr. 34 (2005), 17-34. (Pubitemid 40308070)
    • (2005) Designs, Codes, and Cryptography , vol.34 , Issue.1 , pp. 17-34
    • Marti-Farre, J.1    Padro, C.2
  • 33
    • 32144455532 scopus 로고    scopus 로고
    • Secret sharing schemes on access structures with intersection number equal to one
    • DOI 10.1016/j.dam.2005.09.003, PII S0166218X05002702
    • J. Martí-Farré and C. Padró, Secret sharing schemes on access structures with intersection number equal to one, Discrete Applied Mathematics 154 (2006), 552-563. (Pubitemid 43207392)
    • (2006) Discrete Applied Mathematics , vol.154 , Issue.3 , pp. 552-563
    • Marti-Farre, J.1    Padro, C.2
  • 34
    • 0345884729 scopus 로고    scopus 로고
    • Matroid representations by partitions
    • PII S0012365X99000047
    • F. Matúš, Matroid representations by partitions, Discrete Math. 203 (1999), 169-194. (Pubitemid 129604254)
    • (1999) Discrete Mathematics , vol.203 , Issue.1-3 , pp. 169-194
    • Matus, F.1
  • 37
    • 0004061262 scopus 로고
    • Oxford Science Publications. The Clarendon Press, Oxford University Press, New York
    • J. G. Oxley, Matroid theory. Oxford Science Publications. The Clarendon Press, Oxford University Press, New York, 1992.
    • (1992) Matroid Theory
    • Oxley, J.G.1
  • 38
    • 0034315039 scopus 로고    scopus 로고
    • Secret sharing schemes with bipartite access structure
    • DOI 10.1109/18.887867
    • C. Padró and G. Sáez, Secret sharing schemes with bipartite access structure, IEEE Trans. Inform. Theory 46 (2000), 2596-2604. (Pubitemid 32090036)
    • (2000) IEEE Transactions on Information Theory , vol.46 , Issue.7 , pp. 2596-2604
    • Padro, C.1    Saez, G.2
  • 39
    • 0037200862 scopus 로고    scopus 로고
    • Lower bounds on the information rate of secret sharing schemes with homogeneous access structure
    • DOI 10.1016/S0020-0190(02)00213-2, PII S0020019002002132
    • C. Padró and G. Sáez, Lower bounds on the information rate of secret sharing schemes with homogeneous access structure. Inform. Process. Lett. 83 (2002), 345-351. (Pubitemid 34808434)
    • (2002) Information Processing Letters , vol.83 , Issue.6 , pp. 345-351
    • Padro, C.1    Saez, G.2
  • 40
    • 0039935716 scopus 로고
    • A forbidden minor characterization of matroid ports
    • P. D. Seymour, A forbidden minor characterization of matroid ports, Quart. J. Math. Oxford Ser. 27 (1976), 407-413.
    • (1976) Quart. J. Math. Oxford Ser. , vol.27 , pp. 407-413
    • Seymour, P.D.1
  • 41
  • 42
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, How to share a secret, Commun. of the ACM 22 (1979), 612-613.
    • (1979) Commun. of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 44
    • 0000708528 scopus 로고
    • An explication of secret sharing schemes
    • D. R. Stinson, An explication of secret sharing schemes, Des. Codes Cryptogr. 2 (1992), 357-390.
    • (1992) Des. Codes Cryptogr. , vol.2 , pp. 357-390
    • Stinson, D.R.1
  • 46
    • 0028323999 scopus 로고
    • Decomposition constructions for secret-sharing schemes
    • D. R. Stinson, Decomposition constructions for secret-sharing schemes, IEEE Trans. Inform. Theory 40 (1994), 118-125.
    • (1994) IEEE Trans. Inform. Theory , vol.40 , pp. 118-125
    • Stinson, D.R.1
  • 48
    • 0032124111 scopus 로고    scopus 로고
    • On characterization of entropy function via information inequalities
    • PII S001894489803630X
    • Z. Zhang and R.W. Yeung, On characterization of entropy function via information inequalities, IEEE Trans. Inform. Theory 44 (1998), 1440-1452. (Pubitemid 128736707)
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.4 , pp. 1440-1452
    • Zhang, Z.1    Yeung, R.W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.