Ideal Hierarchical Secret Sharing Schemes

被引:41
作者
Farras, Oriol [1 ]
Padro, Carles [2 ]
机构
[1] Univ Rovira & Virgili, Tarragona 43003, Catalonia, Spain
[2] Nanyang Technol Univ, Singapore 639798, Singapore
基金
新加坡国家研究基金会;
关键词
Boolean polymatroids; hierarchical secret sharing; ideal secret sharing schemes; integer polymatroids; multipartite secret sharing; secret sharing; weighted threshold secret sharing; MATROIDS;
D O I
10.1109/TIT.2011.2182034
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, and it has attracted a lot of attention since the invention of secret sharing until nowadays. Several constructions of ideal hierarchical secret sharing schemes have been proposed, but it was not known what access structures admit such a scheme. We solve this problem by providing a natural definition for the family of the hierarchical access structures and, more importantly, by presenting a complete characterization of the ideal hierarchical access structures, that is, the ones admitting an ideal secret sharing scheme. Our characterization is based on the well-known connection between ideal secret sharing schemes and matroids and, more specifically, on the connection between ideal multipartite secret sharing schemes and integer polymatroids. In particular, we prove that every hierarchical matroid port admits an ideal linear secret sharing scheme over every large enough finite field. Finally, we use our results to present a new proof for the existing characterization of the ideal weighted threshold access structures.
引用
收藏
页码:3273 / 3286
页数:14
相关论文
共 36 条
[1]  
[Anonymous], 1990, Proceedings on Advances in Cryptology
[2]  
[Anonymous], 2003, COMBINATORIAL OPTIMI
[3]  
[Anonymous], ANN DISCRETE MATH
[4]  
[Anonymous], 1989, J COMB MATH COMB COM
[5]  
[Anonymous], 2010, Matroid theory
[6]   Monotone circuits for monotone weighted threshold functions [J].
Beimel, A ;
Weinreb, E .
INFORMATION PROCESSING LETTERS, 2006, 97 (01) :12-18
[7]  
Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
[8]   Characterizing ideal weighted threshold secret sharing [J].
Beimel, Amos ;
Tassa, Tamir ;
Weinreb, Enav .
SIAM JOURNAL ON DISCRETE MATHEMATICS, 2008, 22 (01) :360-397
[9]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[10]  
Brickell E. F., 1991, Journal of Cryptology, V4, P123, DOI 10.1007/BF00196772