Skip to main content

2018 | OriginalPaper | Buchkapitel

Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing

verfasst von : Oriol Farràs, Tarik Kaced, Sebastià Martín, Carles Padró

Erschienen in: Advances in Cryptology – EUROCRYPT 2018

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We present a new improvement in the linear programming technique to derive lower bounds on the information ratio of secret sharing schemes. We obtain non-Shannon-type bounds without using information inequalities explicitly. Our new technique makes it possible to determine the optimal information ratio of linear secret sharing schemes for all access structures on 5 participants and all graph-based access structures on 6 participants. In addition, new lower bounds are presented also for some small matroid ports and, in particular, the optimal information ratios of the linear secret sharing schemes for the ports of the Vamos matroid are determined.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ahlswede, R., Körner, J.: On the connection between the entropies of input and output distributions of discrete memoryless channels. In: Proceedings of the 5th Brasov Conference on Probability Theory, Brasov, Editura Academiei, Bucuresti, pp. 13–23 (1977) Ahlswede, R., Körner, J.: On the connection between the entropies of input and output distributions of discrete memoryless channels. In: Proceedings of the 5th Brasov Conference on Probability Theory, Brasov, Editura Academiei, Bucuresti, pp. 13–23 (1977)
2.
Zurück zum Zitat Ahlswede, R., Körner, J.: Appendix: on common information and related characteristics of correlated information sources. In: Ahlswede, R., Bäumer, L., Cai, N., Aydinian, H., Blinovsky, V., Deppe, C., Mashurian, H. (eds.) General Theory of Information Transfer and Combinatorics. LNCS, vol. 4123, pp. 664–677. Springer, Heidelberg (2006). https://doi.org/10.1007/11889342_41CrossRef Ahlswede, R., Körner, J.: Appendix: on common information and related characteristics of correlated information sources. In: Ahlswede, R., Bäumer, L., Cai, N., Aydinian, H., Blinovsky, V., Deppe, C., Mashurian, H. (eds.) General Theory of Information Transfer and Combinatorics. LNCS, vol. 4123, pp. 664–677. Springer, Heidelberg (2006). https://​doi.​org/​10.​1007/​11889342_​41CrossRef
3.
Zurück zum Zitat Babai, L., Gál, A., Wigderson, A.: Superpolynomial lower bounds for monotone span programs. Combinatorica 19, 301–319 (1999)MathSciNetCrossRefMATH Babai, L., Gál, A., Wigderson, A.: Superpolynomial lower bounds for monotone span programs. Combinatorica 19, 301–319 (1999)MathSciNetCrossRefMATH
8.
Zurück zum Zitat Beimel, A., Orlov, I.: Secret sharing and non-Shannon information inequalities. IEEE Trans. Inform. Theory 57, 5634–5649 (2011)MathSciNetCrossRefMATH Beimel, A., Orlov, I.: Secret sharing and non-Shannon information inequalities. IEEE Trans. Inform. Theory 57, 5634–5649 (2011)MathSciNetCrossRefMATH
9.
Zurück zum Zitat Blakley, G.R.: Safeguarding cryptographic keys. In: AFIPS Conference Proceedings, vol. 48, pp. 313–317 (1979) Blakley, G.R.: Safeguarding cryptographic keys. In: AFIPS Conference Proceedings, vol. 48, pp. 313–317 (1979)
10.
Zurück zum Zitat Blundo, C., De Santis, A., De Simone, R., Vaccaro, U.: Tight bounds on the information rate of secret sharing schemes. Des. Codes Cryptogr. 11, 107–122 (1997)MathSciNetCrossRefMATH Blundo, C., De Santis, A., De Simone, R., Vaccaro, U.: Tight bounds on the information rate of secret sharing schemes. Des. Codes Cryptogr. 11, 107–122 (1997)MathSciNetCrossRefMATH
11.
Zurück zum Zitat Brickell, E.F., Davenport, D.M.: On the classification of ideal secret sharing schemes. J. Cryptol. 4, 123–134 (1991)MATH Brickell, E.F., Davenport, D.M.: On the classification of ideal secret sharing schemes. J. Cryptol. 4, 123–134 (1991)MATH
12.
Zurück zum Zitat Capocelli, R.M., De Santis, A., Gargano, L., Vaccaro, U.: On the size of shares for secret sharing schemes. J. Cryptol. 6, 157–167 (1993)CrossRefMATH Capocelli, R.M., De Santis, A., Gargano, L., Vaccaro, U.: On the size of shares for secret sharing schemes. J. Cryptol. 6, 157–167 (1993)CrossRefMATH
13.
Zurück zum Zitat Chen, B.L., Sun, H.M.: Weighted decomposition construction for perfect secret sharing schemes. Comput. Math. Appl. 43, 877–887 (2002)MathSciNetCrossRefMATH Chen, B.L., Sun, H.M.: Weighted decomposition construction for perfect secret sharing schemes. Comput. Math. Appl. 43, 877–887 (2002)MathSciNetCrossRefMATH
14.
Zurück zum Zitat Csirmaz, L.: The dealer’s random bits in perfect secret sharing schemes. Studia Sci. Math. Hungar. 32, 429–437 (1996)MathSciNetMATH Csirmaz, L.: The dealer’s random bits in perfect secret sharing schemes. Studia Sci. Math. Hungar. 32, 429–437 (1996)MathSciNetMATH
18.
Zurück zum Zitat Csirmaz, L., Tardos, G.: Optimal information rate of secret sharing schemes on trees. IEEE Trans. Inf. Theory 59, 2527–2530 (2013)MathSciNetCrossRefMATH Csirmaz, L., Tardos, G.: Optimal information rate of secret sharing schemes on trees. IEEE Trans. Inf. Theory 59, 2527–2530 (2013)MathSciNetCrossRefMATH
19.
Zurück zum Zitat Csiszar, I., Körner, J.: Information Theory: Coding Theorems for Discrete Memoryless Systems. Academic Press, Akademiai Kiado, New York, Budapest (1981)MATH Csiszar, I., Körner, J.: Information Theory: Coding Theorems for Discrete Memoryless Systems. Academic Press, Akademiai Kiado, New York, Budapest (1981)MATH
20.
21.
22.
Zurück zum Zitat Dougherty, R., Freiling, C., Zeger, K.: Six new non-Shannon information inequalities. In: 2006 IEEE International Symposium on Information Theory, pp. 233–236 (2006) Dougherty, R., Freiling, C., Zeger, K.: Six new non-Shannon information inequalities. In: 2006 IEEE International Symposium on Information Theory, pp. 233–236 (2006)
25.
Zurück zum Zitat Farràs, O., Metcalf-Burton, J.R., Padró, C., Vázquez, L.: On the optimization of bipartite secret sharing schemes. Des. Codes Cryptogr. 63, 255–271 (2012)MathSciNetCrossRefMATH Farràs, O., Metcalf-Burton, J.R., Padró, C., Vázquez, L.: On the optimization of bipartite secret sharing schemes. Des. Codes Cryptogr. 63, 255–271 (2012)MathSciNetCrossRefMATH
27.
Zurück zum Zitat Fujishige, S.: Entropy functions and polymatroids-combinatorial structures in information theory. Electron. Comm. Japan 61, 14–18 (1978)MathSciNet Fujishige, S.: Entropy functions and polymatroids-combinatorial structures in information theory. Electron. Comm. Japan 61, 14–18 (1978)MathSciNet
28.
Zurück zum Zitat Gács, P., Körner, J.: Common information is far less than mutual information. Probl. Control Inf. Theory 2, 149–162 (1973)MathSciNetMATH Gács, P., Körner, J.: Common information is far less than mutual information. Probl. Control Inf. Theory 2, 149–162 (1973)MathSciNetMATH
29.
Zurück zum Zitat Gharahi, M: On the complexity of perfect secret sharing schemes. Ph.D. Thesis, Iran University of Science and Technology (2013) (in Persian) Gharahi, M: On the complexity of perfect secret sharing schemes. Ph.D. Thesis, Iran University of Science and Technology (2013) (in Persian)
30.
Zurück zum Zitat Gharahi, M., Dehkordi, M.H.: The complexity of the graph access structures on six participants. Des. Codes Cryptogr. 67, 169–173 (2013)MathSciNetCrossRefMATH Gharahi, M., Dehkordi, M.H.: The complexity of the graph access structures on six participants. Des. Codes Cryptogr. 67, 169–173 (2013)MathSciNetCrossRefMATH
31.
Zurück zum Zitat Gharahi, M., Dehkordi, M.H.: Average complexities of access structures on five participants. Adv. Math. Commun. 7, 311–317 (2013)MathSciNetCrossRefMATH Gharahi, M., Dehkordi, M.H.: Average complexities of access structures on five participants. Adv. Math. Commun. 7, 311–317 (2013)MathSciNetCrossRefMATH
32.
Zurück zum Zitat Gharahi, M., Dehkordi, M.H: Perfect secret sharing schemes for graph access structures on six participants. J. Math. Cryptol. 7, 143–146 (2013) Gharahi, M., Dehkordi, M.H: Perfect secret sharing schemes for graph access structures on six participants. J. Math. Cryptol. 7, 143–146 (2013)
33.
Zurück zum Zitat Gharahi, M., Khazaei, S.: Optimal linear secret sharing schemes for graph access structures on six participants. Cryptology ePrint Archive: Report 2017/1232 (2017) Gharahi, M., Khazaei, S.: Optimal linear secret sharing schemes for graph access structures on six participants. Cryptology ePrint Archive: Report 2017/1232 (2017)
34.
Zurück zum Zitat Hammer, D., Romashchenko, A.E., Shen, A., Vereshchagin, N.K.: Inequalities for Shannon entropy and Kolmogorov complexity. J. Comput. Syst. Sci. 60, 442–464 (2000)MathSciNetCrossRefMATH Hammer, D., Romashchenko, A.E., Shen, A., Vereshchagin, N.K.: Inequalities for Shannon entropy and Kolmogorov complexity. J. Comput. Syst. Sci. 60, 442–464 (2000)MathSciNetCrossRefMATH
35.
Zurück zum Zitat Ingleton, A.W.: Representation of matroids. In: Welsh, D.J.A. (ed.) Combinatorial Mathematics and its Applications, pp. 149–167. Academic Press, London (1971) Ingleton, A.W.: Representation of matroids. In: Welsh, D.J.A. (ed.) Combinatorial Mathematics and its Applications, pp. 149–167. Academic Press, London (1971)
36.
37.
Zurück zum Zitat Jackson, W.A., Martin, K.M.: Perfect secret sharing schemes on five participants. Des. Codes Cryptogr. 9, 267–286 (1996)MathSciNetMATH Jackson, W.A., Martin, K.M.: Perfect secret sharing schemes on five participants. Des. Codes Cryptogr. 9, 267–286 (1996)MathSciNetMATH
41.
Zurück zum Zitat Li, Q., Li, X.X., Lai, X.J., Chen, K.F.: Optimal assignment schemes for general access structures based on linear programming. Des. Codes Cryptogr. 74, 623–644 (2015)MathSciNetCrossRefMATH Li, Q., Li, X.X., Lai, X.J., Chen, K.F.: Optimal assignment schemes for general access structures based on linear programming. Des. Codes Cryptogr. 74, 623–644 (2015)MathSciNetCrossRefMATH
42.
Zurück zum Zitat Makarychev, K., Makarychev, Y., Romashchenko, A., Vereshchagin, N.: A new class of non-Shannon-type inequalities for entropies. Commun. Inf. Syst. 2, 147–166 (2002)MathSciNetMATH Makarychev, K., Makarychev, Y., Romashchenko, A., Vereshchagin, N.: A new class of non-Shannon-type inequalities for entropies. Commun. Inf. Syst. 2, 147–166 (2002)MathSciNetMATH
43.
Zurück zum Zitat Martí-Farré, J., Padró, C.: Secret sharing schemes with three or four minimal qualified subsets. Des. Codes Cryptogr. 34, 17–34 (2005)MathSciNetCrossRefMATH Martí-Farré, J., Padró, C.: Secret sharing schemes with three or four minimal qualified subsets. Des. Codes Cryptogr. 34, 17–34 (2005)MathSciNetCrossRefMATH
44.
45.
Zurück zum Zitat Martí-Farré, J., Padró, C., Vázquez, L.: Optimal complexity of secret sharing schemes with four minimal qualified subsets. Des. Codes Cryptogr. 61, 167–186 (2011)MathSciNetCrossRefMATH Martí-Farré, J., Padró, C., Vázquez, L.: Optimal complexity of secret sharing schemes with four minimal qualified subsets. Des. Codes Cryptogr. 61, 167–186 (2011)MathSciNetCrossRefMATH
46.
Zurück zum Zitat Martín, S., Padró, C., Yang, A.: Secret sharing, rank inequalities, and information inequalities. IEEE Trans. Inform. Theory 62, 599–609 (2016)MathSciNetCrossRefMATH Martín, S., Padró, C., Yang, A.: Secret sharing, rank inequalities, and information inequalities. IEEE Trans. Inform. Theory 62, 599–609 (2016)MathSciNetCrossRefMATH
47.
Zurück zum Zitat Matúš, F.: Infinitely many information inequalities. In: Proceedings of the IEEE International Symposium on Information Theory, (ISIT), pp. 2101–2105 (2007) Matúš, F.: Infinitely many information inequalities. In: Proceedings of the IEEE International Symposium on Information Theory, (ISIT), pp. 2101–2105 (2007)
48.
Zurück zum Zitat Metcalf-Burton, J.R.: Improved upper bounds for the information rates of the secret sharing schemes induced by the Vámos matroid. Discret. Math. 311, 651–662 (2011)MathSciNetCrossRefMATH Metcalf-Burton, J.R.: Improved upper bounds for the information rates of the secret sharing schemes induced by the Vámos matroid. Discret. Math. 311, 651–662 (2011)MathSciNetCrossRefMATH
49.
Zurück zum Zitat Oxley, J.G: Matroid Theory. Oxford Science Publications, The Clarendon Press, Oxford University Press, New York (1992) Oxley, J.G: Matroid Theory. Oxford Science Publications, The Clarendon Press, Oxford University Press, New York (1992)
50.
Zurück zum Zitat Padró, C.: Lecture Notes in secret sharing. Cryptology ePrint Archive, Report 2012/674 (2912) Padró, C.: Lecture Notes in secret sharing. Cryptology ePrint Archive, Report 2012/674 (2912)
51.
Zurück zum Zitat Padró, C., Sáez, G.: Secret sharing schemes with bipartite access structure. IEEE Trans. Inform. Theory 46, 2596–2604 (2000)MathSciNetCrossRefMATH Padró, C., Sáez, G.: Secret sharing schemes with bipartite access structure. IEEE Trans. Inform. Theory 46, 2596–2604 (2000)MathSciNetCrossRefMATH
52.
Zurück zum Zitat Padró, C., Vázquez, L., Yang, A.: Finding lower bounds on the complexity of secret sharing schemes by linear programming. Discret. Appl. Math. 161, 1072–1084 (2013)MathSciNetCrossRefMATH Padró, C., Vázquez, L., Yang, A.: Finding lower bounds on the complexity of secret sharing schemes by linear programming. Discret. Appl. Math. 161, 1072–1084 (2013)MathSciNetCrossRefMATH
53.
Zurück zum Zitat Pitassi T., Robere R., Lifting Nullstellensatz to Monotone Span Programs over any Field. Electronic Colloquium on Computational Complexity (ECCC), vol. 165 (2017) Pitassi T., Robere R., Lifting Nullstellensatz to Monotone Span Programs over any Field. Electronic Colloquium on Computational Complexity (ECCC), vol. 165 (2017)
55.
Zurück zum Zitat Robere, R., Pitassi, T., Rossman, B., Cook, S.A.: Exponential lower bounds for monotone span programs. In: FOCS 2016, pp. 406–415 (2016) Robere, R., Pitassi, T., Rossman, B., Cook, S.A.: Exponential lower bounds for monotone span programs. In: FOCS 2016, pp. 406–415 (2016)
56.
60.
61.
Zurück zum Zitat Thakor, S., Chan, T., Grant, A.: Capacity bounds for networks with correlated sources and characterisation of distributions by entropies. IEEE Trans. Inf. Theory 63, 3540–3553 (2017)MathSciNetCrossRefMATH Thakor, S., Chan, T., Grant, A.: Capacity bounds for networks with correlated sources and characterisation of distributions by entropies. IEEE Trans. Inf. Theory 63, 3540–3553 (2017)MathSciNetCrossRefMATH
63.
Zurück zum Zitat Yeung, R.W.: A First Course in Information Theory. Kluwer Academic/Plenum Publishers, New York (2002)CrossRef Yeung, R.W.: A First Course in Information Theory. Kluwer Academic/Plenum Publishers, New York (2002)CrossRef
64.
Zurück zum Zitat Yeung, R.W.: Information Theory and Network Coding. Springer, Boston (2008)MATH Yeung, R.W.: Information Theory and Network Coding. Springer, Boston (2008)MATH
65.
Zurück zum Zitat Zhang, Z.: On a new non-Shannon type information inequality. Commun. Inf. Syst. 3, 47–60 (2003)MathSciNetMATH Zhang, Z.: On a new non-Shannon type information inequality. Commun. Inf. Syst. 3, 47–60 (2003)MathSciNetMATH
66.
Zurück zum Zitat Zhang, Z., Yeung, R.W.: On characterization of entropy function via information inequalities. IEEE Trans. Inf. Theory 44, 1440–1452 (1998)MathSciNetCrossRefMATH Zhang, Z., Yeung, R.W.: On characterization of entropy function via information inequalities. IEEE Trans. Inf. Theory 44, 1440–1452 (1998)MathSciNetCrossRefMATH
Metadaten
Titel
Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing
verfasst von
Oriol Farràs
Tarik Kaced
Sebastià Martín
Carles Padró
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-78381-9_22

Premium Partner