Mostra el registre d'ítem simple
On the information ratio of non-perfect secret sharing schemes
dc.contributor.author | Farràs Ventura, Oriol |
dc.contributor.author | Hansen, Torben |
dc.contributor.author | Kaced, Tarik |
dc.contributor.author | Padró Laimon, Carles |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament de Matemàtiques |
dc.date.accessioned | 2018-02-23T09:46:09Z |
dc.date.available | 2018-12-01T01:31:02Z |
dc.date.issued | 2017-12-01 |
dc.identifier.citation | Farràs Ventura, O., Hansen, T., Kaced, T., Padro, C. On the information ratio of non-perfect secret sharing schemes. "Algorithmica", 1 Desembre 2017, vol. 79, núm. 4, p. 987-1013. |
dc.identifier.issn | 0178-4617 |
dc.identifier.uri | http://hdl.handle.net/2117/114396 |
dc.description | The final publication is available at Springer via http://dx.doi.org/10.1007/s00453-016-0217-9 |
dc.description.abstract | A secret sharing scheme is non-perfect if some subsets of players that cannot recover the secret value have partial information about it. The information ratio of a secret sharing scheme is the ratio between the maximum length of the shares and the length of the secret. This work is dedicated to the search of bounds on the information ratio of non-perfect secret sharing schemes and the construction of efficient linear non-perfect secret sharing schemes. To this end, we extend the known connections between matroids, polymatroids and perfect secret sharing schemes to the non-perfect case. In order to study non-perfect secret sharing schemes in all generality, we describe their structure through their access function, a real function that measures the amount of information on the secret value that is obtained by each subset of players. We prove that there exists a secret sharing scheme for every access function. Uniform access functions, that is, access functions whose values depend only on the number of players, generalize the threshold access structures. The optimal information ratio of the uniform access functions with rational values has been determined by Yoshida, Fujiwara and Fossorier. By using the tools that are described in our work, we provide a much simpler proof of that result and we extend it to access functions with real values. |
dc.format.extent | 27 p. |
dc.language.iso | eng |
dc.subject | Àrees temàtiques de la UPC::Matemàtiques i estadística::Àlgebra |
dc.subject.lcsh | Coding theory |
dc.subject.other | Secret sharing |
dc.subject.other | Non-perfect secret sharing |
dc.subject.other | Access function |
dc.subject.other | Information ratio |
dc.subject.other | Polymatroid |
dc.title | On the information ratio of non-perfect secret sharing schemes |
dc.type | Article |
dc.subject.lemac | Codificació, Teoria de la |
dc.contributor.group | Universitat Politècnica de Catalunya. MAK - Matemàtica Aplicada a la Criptografia |
dc.identifier.doi | 10.1007/s00453-016-0217-9 |
dc.description.peerreviewed | Peer Reviewed |
dc.subject.ams | Classificació AMS::94 Information And Communication, Circuits::94A Communication, information |
dc.relation.publisherversion | https://link.springer.com/article/10.1007%2Fs00453-016-0217-9 |
dc.rights.access | Open Access |
local.identifier.drac | 21578575 |
dc.description.version | Postprint (author's final draft) |
dc.relation.projectid | info:eu-repo/grantAgreement/EC/H2020/644024/EU/A FRAMEWORK FOR USER CENTRED PRIVACY AND SECURITY IN THE CLOUD/CLARUS |
local.citation.author | Farràs Ventura, O.; Hansen, T.; Kaced, T.; Padro, C. |
local.citation.publicationName | Algorithmica |
local.citation.volume | 79 |
local.citation.number | 4 |
local.citation.startingPage | 987 |
local.citation.endingPage | 1013 |
Fitxers d'aquest items
Aquest ítem apareix a les col·leccions següents
-
Articles de revista [48]
-
Articles de revista [3.267]