首页> 外文OA文献 >Finding lower bounds on the complexity of secret sharing schemes by linear programming
【2h】

Finding lower bounds on the complexity of secret sharing schemes by linear programming

机译:通过线性规划找到秘密共享方案复杂性的下限

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Optimizing the maximum, or average, length of the shares in relation to the length of the secret for every given access structure is a difficult and long-standing open problem in cryptology. Most of the known lower bounds on these parameters have been obtained by implicitly or explicitly using that every secret sharing scheme defines a polymatroid related to the access structure. The best bounds that can be obtained by this combinatorial method can be determined by using linear programming, and this can be effectively done for access structures on a small number of participants.\ud\udBy applying this linear programming approach, we improve some of the known lower bounds for the access structures on five participants and the graph access structures on six participants for which these parameters were still undetermined. Nevertheless, the lower bounds that are obtained by this combinatorial method are not tight in general. For some access structures, they can be improved by adding to the linear program non-Shannon information inequalities as new constraints. We obtain in this way new separation results for some graph access structures on eight participants and for some ports of non-representable matroids. Finally, we prove that, for two access structures on five participants, the combinatorial lower bound cannot be attained by any linear secret sharing scheme
机译:对于每个给定的访问结构,相对于秘密的长度优化共享的最大或平均长度是密码学中一个长期存在的难题。这些参数的大多数已知下限已通过隐式或显式使用每个秘密共享方案定义了与访问结构相关的多线型来获得。可以通过使用线性规划来确定通过此组合方法可获得的最佳界限,并且可以对少量参与者上的访问结构有效地做到这一点。\ ud \ ud通过应用这种线性规划方法,我们改进了一些五个参与者的访问结构的已知下界和六个参与者的图形访问结构的已知下限,但这些参数尚未确定。但是,通过这种组合方法获得的下限通常并不严格。对于某些访问结构,可以通过向线性程序中添加非香农信息不等式作为新约束来改善它们。通过这种方式,我们获得了针对八个参与者上的某些图形访问结构以及某些无法表示的拟阵的端口的新分离结果。最后,我们证明,对于五个参与者的两个访问结构,任何线性秘密共享方案都无法获得组合下界

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号