AbstractA matroid M is secret-sharing if there is a finite set S and a matrix A = (aij: i ∈ I, j ∈ E(M)) with entries in S, such that for all X ⊇ E(M), the submatrix (aij : i ∈ I, j ∈ X) has precisely |S|rk(χ) distinct rows. Such matroids occur naturally in the study of secret-sharing schemes in cryptography. Brickell and Davenport (J. Cryptography, to appear) asked if every matroid is a secret-sharing matroid. We answer this negatively, by showing that the Vamos matroid is not
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
One important result in secret sharing is the Brickell-Davenport Theorem: every ideal perfect secret...
The matroid associated to a linear code is the representable matroid that is defined by the columns ...
In a secret-sharing scheme, a secret value is distributed among a set of parties by giving each part...
Secret-sharing schemes are a tool used in many cryptographic protocols. In these schemes, a dealer h...
One of the main open problems in secret sharing is the characterization of the access structures of...
The complexity of a secret sharing scheme is defined as the ratio between the maximum length of the ...
summary:A secret sharing scheme is ideal if the size of each share is equal to the size of the secre...
Maximum-sized results are an important part of matroid theory, and results currently exist for vario...
In secret sharing, the exact characterization of ideal access structures is a longstanding open prob...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Multipartite secret sharing schemes are those having a multipartite access structure, in which the s...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Secret sharing, which refers to methods of distributing a secret value among a group of participants...
Funding Information: We thank Camilla Hollanti for advising during this project. We thank Amy Wiebe,...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
One important result in secret sharing is the Brickell-Davenport Theorem: every ideal perfect secret...
The matroid associated to a linear code is the representable matroid that is defined by the columns ...
In a secret-sharing scheme, a secret value is distributed among a set of parties by giving each part...
Secret-sharing schemes are a tool used in many cryptographic protocols. In these schemes, a dealer h...
One of the main open problems in secret sharing is the characterization of the access structures of...
The complexity of a secret sharing scheme is defined as the ratio between the maximum length of the ...
summary:A secret sharing scheme is ideal if the size of each share is equal to the size of the secre...
Maximum-sized results are an important part of matroid theory, and results currently exist for vario...
In secret sharing, the exact characterization of ideal access structures is a longstanding open prob...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Multipartite secret sharing schemes are those having a multipartite access structure, in which the s...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Secret sharing, which refers to methods of distributing a secret value among a group of participants...
Funding Information: We thank Camilla Hollanti for advising during this project. We thank Amy Wiebe,...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
One important result in secret sharing is the Brickell-Davenport Theorem: every ideal perfect secret...
The matroid associated to a linear code is the representable matroid that is defined by the columns ...