Codes and cryptography
Journal of Combinatorial Theory Series B
An explication of secret sharing schemes
Designs, Codes and Cryptography
The Combinatorics of Perfect Authentication Schemes
SIAM Journal on Discrete Mathematics
Perfect Secret Sharing Schemes on Five Participants
Designs, Codes and Cryptography
Designs, Codes and Cryptography
Communications of the ACM
A Representation of a Family of Secret Sharing Matroids
Designs, Codes and Cryptography
Ideal Multipartite Secret Sharing Schemes
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
On Non-representable Secret Sharing Matroids
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Ideal hierarchical secret sharing schemes
TCC'10 Proceedings of the 7th international conference on Theory of Cryptography
On codes, matroids and secure multi-party computation from linear secret sharing schemes
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
On matroids and non-ideal secret sharing
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Hi-index | 0.00 |
In an ideal secret sharing scheme, the access structure is uniquely determined by its minimal sets \Delta_s. The purpose of this paper is to characterise \Delta_s. We introduce the concept of strong connectivity and show that under this equivalence relation, an ideal secret sharing scheme decomposes into threshold schemes. We also give a description of the minimal sets that span the strong connectivity classes. As a result we obtain a necessary condition on the types of subsets that are allowed in an ideal access structure as well as an upper bound on the number of such access structures.