dc.contributor.author | Csirmaz, Laszlo |
dc.contributor.author | Matús, Frantisek |
dc.contributor.author | Padró Laimon, Carles |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament de Matemàtiques |
dc.date.accessioned | 2024-03-15T10:58:20Z |
dc.date.available | 2024-03-15T10:58:20Z |
dc.date.issued | 2024-05-01 |
dc.identifier.citation | Csirmaz, L.; Matús, F.; Padro, C. Bipartite secret sharing and staircases. "Discrete mathematics", 1 Maig 2024, vol. 347, núm. article 113909. |
dc.identifier.issn | 1872-681X |
dc.identifier.other | https://arxiv.org/abs/2103.04904 |
dc.identifier.uri | http://hdl.handle.net/2117/404705 |
dc.description | © 2024 Elsevier. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/ |
dc.description.abstract | Bipartite secret sharing schemes have a bipartite access structure in which the set of participants is divided into two parts and all participants in the same part play an equivalent role. Such a bipartite scheme can be described by a staircase: the collection of its minimal points. The complexity of a scheme is the maximal share size relative to the secret size; and the ¿-complexity of an access structure is the best lower bound provided by the entropy method. An access structure is ¿-ideal if it has ¿-complexity 1. Motivated by the abundance of open problems in this area, the main results can be summarized as follows. First, a new characterization of ¿-ideal multipartite access structures is given which offers a straightforward and simple approach to describe ideal bipartite and tripartite access structures. Second, the ¿-complexity is determined for a range of bipartite access structures, including those determined by two points, staircases with equal widths and heights, and staircases with all heights 1. Third, matching linear schemes are presented for some non-ideal cases, including staircases where all heights are 1 and all widths are equal. Finally, finding the Shannon complexity of a bipartite access structure can be considered as a discrete submodular optimization problem. An interesting and intriguing continuous version is defined which might give further insight to the large-scale behavior of these optimization problems. |
dc.description.sponsorship | The work of the first author was partially supported by the ERC Advanced Grant ERMiD. The work of third author was supported by the Spanish Government (MICINN) under Project PID2019-109379RB-I00. |
dc.language.iso | eng |
dc.publisher | Elsevier |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International |
dc.rights | ©2024. Elsevier |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ |
dc.subject | Àrees temàtiques de la UPC::Matemàtiques i estadística::Àlgebra::Teoria de nombres |
dc.subject | Àrees temàtiques de la UPC::Matemàtiques i estadística::Investigació operativa::Optimització |
dc.subject.lcsh | Number theory |
dc.subject.lcsh | System theory |
dc.subject.other | Cryptography |
dc.subject.other | Multipartite secret sharing |
dc.subject.other | Entropy method |
dc.subject.other | Linear secret sharing |
dc.subject.other | Submodular optimization |
dc.title | Bipartite secret sharing and staircases |
dc.type | Article |
dc.subject.lemac | Nombres, Teoria dels |
dc.subject.lemac | Sistemes de control |
dc.contributor.group | Universitat Politècnica de Catalunya. ISG-MAK - Information Security Group - Mathematics Applied to Cryptography |
dc.identifier.doi | 10.1016/j.disc.2024.113909 |
dc.description.peerreviewed | Peer Reviewed |
dc.subject.ams | Classificació AMS::11 Number theory::11T Finite fields and commutative rings (number-theoretic aspects) |
dc.subject.ams | Classificació AMS::93 Systems Theory; Control::93C Control systems, guided systems |
dc.relation.publisherversion | https://www.sciencedirect.com/science/article/abs/pii/S0012365X24000402 |
dc.rights.access | Open Access |
local.identifier.drac | 37970898 |
dc.description.version | Postprint (author's final draft) |
dc.relation.projectid | info:eu-repo/grantAgreement/AEI/Plan Estatal de Investigación Científica y Técnica y de Innovación 2017-2020/PID2019-109379RB-I00/ES/CRIPTOGRAFIA PARA RETOS DIGITALES EMERGENTES: ESCENARIOS MULTI-USUARIO Y SEGURIDAD POST-CUANTICA/ |
local.citation.author | Csirmaz, L.; Matús, F.; Padro, C. |
local.citation.publicationName | Discrete mathematics |
local.citation.volume | 347 |
local.citation.number | article 113909 |