Finding lower bounds on the complexity of secret sharing schemes by linear programming

被引:16
作者
Padro, Carles [1 ]
Vazquez, Leonor [2 ]
Yang, An [1 ]
机构
[1] Nanyang Technol Univ, Sch Phys & Math Sci, Singapore 639798, Singapore
[2] ORIONEARTH, Oil Reservoir Integrat Earth, Mexico City, DF, Mexico
基金
新加坡国家研究基金会;
关键词
Secret sharing; Linear programming; Polymatroid; Non-Shannon information inequalities; CONSTRUCTIONS; MATROIDS; POWER;
D O I
10.1016/j.dam.2012.10.020
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Optimizing the maximum, or average, length of the shares in relation to the length of the secret for every given access structure is a difficult and long-standing open problem in cryptology. Most of the known lower bounds on these parameters have been obtained by implicitly or explicitly using that every secret sharing scheme defines a polymatroid related to the access structure. The best bounds that can be obtained by this combinatorial method can be determined by using linear programming, and this can be effectively done for access structures on a small number of participants. By applying this linear programming approach, we improve some of the known lower bounds for the access structures on five participants and the graph access structures on six participants for which these parameters were still undetermined. Nevertheless, the lower bounds that are obtained by this combinatorial method are not tight in general. For some access structures, they can be improved by adding to the linear program non-Shannon information inequalities as new constraints. We obtain in this way new separation results for some graph access structures on eight participants and for some ports of non-representable matroids. Finally, we prove that, for two access structures on five participants, the combinatorial lower bound cannot be attained by any linear secret sharing scheme. (C) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:1072 / 1084
页数:13
相关论文
共 43 条
  • [1] Anderson I., 1987, Combinatorics of finite sets
  • [2] [Anonymous], 1971, Combinatorial Mathematics and its Applications
  • [3] [Anonymous], NONSHANNON INFORM IN
  • [4] On the power of nonlinear secret-sharing
    Beimel, A
    Ishai, Y
    [J]. SIAM JOURNAL ON DISCRETE MATHEMATICS, 2005, 19 (01) : 258 - 280
  • [5] Separating the power of monotone span programs over different fields
    Beimel, A
    Weinreb, E
    [J]. SIAM JOURNAL ON COMPUTING, 2005, 34 (05) : 1196 - 1215
  • [6] Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
  • [7] Beimel A, 2008, LECT NOTES COMPUT SC, V4948, P194, DOI 10.1007/978-3-540-78524-8_12
  • [8] Beimel A, 2009, LECT NOTES COMPUT SC, V5444, P539
  • [9] Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
  • [10] Tight Bounds on the Information Rate of Secret Sharing Schemes
    Carlo Blundo
    Alfredo De Santis
    Roberto De Simone
    Ugo Vaccaro
    [J]. Designs, Codes and Cryptography, 1997, 11 (2) : 107 - 110