Improved upper bounds for the information rates of the secret sharing schemes induced by the Vámos matroid

نویسنده

  • Jessica Ruth Metcalf-Burton
چکیده

An access structure specifying the qualified sets of a secret sharing scheme must have information rate less than or equal to one. The Vamos matroid induces two non-isomorphic access structures V1 and V6, which were shown by Mart́ı-Farré and Padró to have information rates of at least 3/4. Beimel, Livne, and Padró showed that the information rates of V1 and V6 are bounded above by 10/11 and 9/10 respectively. Here we improve those upper bounds to 19/21 for V1 and 17/19 for V6.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing

We present a new improvement in the Linear Programming technique to derive bounds on information theoretic problems. In our case, we deal with the search for lower bounds on the information ratio of secret sharing schemes. We obtain non-Shannon-type bounds without using information inequalities explicitly. Our new techniques makes it possible to determine the optimal information ratio of linear...

متن کامل

Matroids Can Be Far from Ideal Secret Sharing

In a secret-sharing scheme, a secret value is distributed among a set of parties by giving each party a share. The requirement is that only predefined subsets of parties can recover the secret from their shares. The family of the predefined authorized subsets is called the access structure. An access structure is ideal if there exists a secret-sharing scheme realizing it in which the shares hav...

متن کامل

From Computational Complexity to Cryptography and to Game Theory

In a secret-sharing scheme, a secret value is distributed among a set of parties by giving each party a share. The requirement is that only predefined subsets of parties can recover the secret from their shares. The family of the predefined authorized subsets is called the access structure. An access structure is ideal if there exists a secret-sharing scheme realizing it in which the shares hav...

متن کامل

BIRS Workshop 09w5103 Applications of Matroid Theory and Combinatorial Optimization to Information and Coding Theory

(in alphabetic order by speaker surname) Speaker Alexander Barg (Dept. of ECE, Univ. of Maryland, College Park, USA) Title Linear Codes in the Ordered Hamming Space Abstract As is well known, the weight distribution of MDS codes in the Hamming metric can be recovered easily from the rank function of a uniform matroid. No such association has been established for the ordered Hamming space (the N...

متن کامل

On the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes

In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Discrete Mathematics

دوره 311  شماره 

صفحات  -

تاریخ انتشار 2011