Mostra el registre d'ítem simple

dc.contributor.authorFarràs Ventura, Oriol
dc.contributor.authorPadró Laimon, Carles
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament de Matemàtiques
dc.date.accessioned2017-07-04T05:40:29Z
dc.date.available2017-07-04T05:40:29Z
dc.date.issued2010
dc.identifier.citationFarràs Ventura, O., Padro, C. Ideal hierarchical secret sharing schemes. A: Theory of Cryptography Conference. "Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010: Zurich, Switzerland: february 9-11, 2010: proceedings". Zurich: Springer, 2010, p. 219-236.
dc.identifier.isbn978-3-642-11799-2
dc.identifier.urihttp://hdl.handle.net/2117/106120
dc.description.abstractHierarchical secret sharing is among the most natural generalizations of threshold secret sharing, and it has attracted a lot of attention from the invention of secret sharing until nowadays. Several constructions of ideal hierarchical secret sharing schemes have been proposed, but it was not known what access structures admit such a scheme. We solve this problem by providing a natural definition for the family of the hierarchical access structures and, more importantly, by presenting a complete characterization of the ideal hierarchical access structures, that is, the ones admitting an ideal secret sharing scheme. Our characterization deals with the properties of the hierarchically minimal sets of the access structure, which are the minimal qualified sets whose participants are in the lowest possible levels in the hierarchy. By using our characterization, it can be efficiently checked whether any given hierarchical access structure that is defined by its hierarchically minimal sets is ideal. We use the well known connection between ideal secret sharing and matroids and, in particular, the fact that every ideal access structure is a matroid port. In addition, we use recent results on ideal multipartite access structures and the connection between multipartite matroids and integer polymatroids. We prove that every ideal hierarchical access structure is the port of a representable matroid and, more specifically, we prove that every ideal structure in this family admits ideal linear secret sharing schemes over fields of all characteristics. In addition, methods to construct such ideal schemes can be derived from the results in this paper and the aforementioned ones on ideal multipartite secret sharing. Finally, we use our results to find a new proof for the characterization of the ideal weighted threshold access structures that is simpler than the existing one.
dc.format.extent18 p.
dc.language.isoeng
dc.publisherSpringer
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 Spain
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/es/
dc.subjectÀrees temàtiques de la UPC::Matemàtiques i estadística::Estadística matemàtica::Anàlisi multivariant
dc.subjectÀrees temàtiques de la UPC::Matemàtiques i estadística::Matemàtica aplicada a les ciències
dc.subject.lcshSequences (Mathematics)
dc.subject.lcshCoding theory
dc.subject.otherSecret sharing
dc.subject.otherIdeal secret sharing schemes
dc.subject.otherHierarchical secret sharing
dc.subject.otherWeighted threshold secret sharing
dc.subject.otherMultipartite secret sharing
dc.subject.otherMultipartite matroids
dc.subject.otherInteger polymatroids
dc.titleIdeal hierarchical secret sharing schemes
dc.typeConference report
dc.subject.lemacSeqüències (Matemàtica)
dc.subject.lemacCodificació, Teoria de la
dc.contributor.groupUniversitat Politècnica de Catalunya. MAK - Matemàtica Aplicada a la Criptografia
dc.identifier.doi10.1007/978-3-642-11799-2_14
dc.description.peerreviewedPeer Reviewed
dc.subject.amsClassificació AMS::62 Statistics::62L Sequential methods
dc.subject.amsClassificació AMS::94 Information And Communication, Circuits::94A Communication, information
dc.relation.publisherversionhttps://link.springer.com/chapter/10.1007%2F978-3-642-11799-2_14
dc.rights.accessOpen Access
local.identifier.drac18547379
dc.description.versionPostprint (author's final draft)
local.citation.authorFarràs Ventura, O.; Padro, C.
local.citation.contributorTheory of Cryptography Conference
local.citation.pubplaceZurich
local.citation.publicationNameTheory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010: Zurich, Switzerland: february 9-11, 2010: proceedings
local.citation.startingPage219
local.citation.endingPage236


Fitxers d'aquest items

Thumbnail

Aquest ítem apareix a les col·leccions següents

Mostra el registre d'ítem simple