Linear Secret Sharing and the Automatic Search of Linear Rank Inequalities

نویسنده

  • Carolina Mejia
چکیده

We study the problem of computing linear rank inequalities, and the related problem of computing lower bounds on the linear share complexity of access structures. We prove that if one knows a generating set for the cone of linear rank inequalities on n + 1 variables, then he can use this generating set and linear programming (or semi-infinite programming) to compute the exact linear optimal information ratio of any access structure on n parties. This theorem shows that it is useful and important to compute generating sets for the cones of linear rank inequalities on a given number of variables. Then, we study the only method we know to cope with the later task, the so called common information method. We investigate the completeness of this method and we prove some preliminary results suggesting that the method is not complete (i.e. there are linear rank inequalities which cannot be obtained via the studied method). Mathematics Subject Classification: 68P30

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions

A non-interactive (t,n)-publicly veriable secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for<...

متن کامل

Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing

We present a new improvement in the Linear Programming technique to derive bounds on information theoretic problems. In our case, we deal with the search for lower bounds on the information ratio of secret sharing schemes. We obtain non-Shannon-type bounds without using information inequalities explicitly. Our new techniques makes it possible to determine the optimal information ratio of linear...

متن کامل

Constrained Linear Representability of Polymatroids and Algorithms for Computing Achievability Proofs in Network Coding

The constrained linear representability problem (CLRP) for polymatroids determines whether there exists a polymatroid that is linear over a specified field while satisfying a collection of constraints on the rank function. Using a computer to test whether a certain rate vector is achievable with vector linear network codes for a multisource network coding instance and whether there exists a mul...

متن کامل

Partage de secret et théorie algorithmique de l’information

Secret sharing deals with splitting a secret data between several participants. The participants are organized within an access structure consisting of groups that may gain access to the secret. The goal is to provide each participant with a piece of information such that the following two requirements are met: 1. Recoverability: a qualified group can recover the secret, 2. Privacy: any other g...

متن کامل

BIRS Workshop 09w5103 Applications of Matroid Theory and Combinatorial Optimization to Information and Coding Theory

(in alphabetic order by speaker surname) Speaker Alexander Barg (Dept. of ECE, Univ. of Maryland, College Park, USA) Title Linear Codes in the Ordered Hamming Space Abstract As is well known, the weight distribution of MDS codes in the Hamming metric can be recovered easily from the rank function of a uniform matroid. No such association has been established for the ordered Hamming space (the N...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015