Skip to main content
Log in

Multipartite matroids and secret sharing

  • Article
  • Quantum Information
  • Published:
Chinese Science Bulletin

Abstract

In a secret-sharing scheme, a secret value is distributed among a set of participants by giving each participant a share. The requirement is that only predefined subsets of participants can recover the secret from their shares. The family of the predefined authorized subsets is called the access structure. An access structure is ideal if there exists a secret-sharing scheme realizing it in which the shares have optimal length, that is, in which the shares are taken from the same domain as the secrets. Brickell and Davenport proved that ideal access structures are induced by matroids. Subsequently, ideal access structures and access structures induced by matroids have received a lot of attention. Seymour gave the first example of an access structure induced by a matroid namely the Vamos matroid, that is non-ideal. Since every matroid is multipartite and has the associated discrete polymatroid, in this paper, by dealing with the rank functions of discrete polymatroids, we obtain a sufficient condition for a multipartite access structure to be ideal. Furthermore, we give a new proof that all access structures related to bipartite and tripartite matroids coincide with the ideal ones. Our results give new contributions to the open problem, that is, which matroids induce ideal access structures.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Shamir A. How to share a secret. Commun ACM, 1979, 22: 612–613

    Article  Google Scholar 

  2. Blakley G R, Safeguarding cryptographic keys. In: Proceedings of National Computer Conference. Montvale, NJ: AFIPS Press, 1979. 48: 313–317

    Google Scholar 

  3. Ito M, Saito A, Nishizeki T. Secret sharing schemes realizing general access structure. In: Proceedings of the IEEE Global Telecommunications Conference. Tokyo, Japan: IEEE Press, 1987. 99–102

    Google Scholar 

  4. Karnin E D, Greene J W, Hellman M E. On secret sharing systems. IEEE T Inform Theory, 1983, 29: 35–41

    Article  Google Scholar 

  5. Brickell E F, Davenport D M. On the classification of ideal secret sharing schemes. J Cryptol, 1991, 4: 123–134

    Google Scholar 

  6. Brickell E F. Some ideal secret sharing schemes. J Comb Math Comb Comput, 1989, 6: 105–113

    Google Scholar 

  7. Seymour P D. On secret-sharing matroids. J Comb Theory B, 1992, 56: 69–73

    Article  Google Scholar 

  8. Matus F. Matroid representations by partitions. Discrete Math, 1999, 203: 169–194

    Article  Google Scholar 

  9. Simonis J, Ashikhmin A. Almost affine codes. Design Code Cryptogr, 1998, 14: 179–197

    Article  Google Scholar 

  10. Cheng Q, Yin Y, Xiao K, et al. On non-representable secret sharing matroids. In: Proceedings of the 5th International Conference on Information Security Practice and Experience. Xi’an, China: Springer, 2009. 5451: 124–135

    Chapter  Google Scholar 

  11. Marti-Farre J, Padro C. On secret sharing schemes, matroids and polymatroids. In: Proceedings of the Fourth Theory of Cryptography Conference. Amsterdam, The Netherlands: Springer, 2007. 4392: 253–272

    Google Scholar 

  12. Ng S-L, Walker M. On the composition of matroids and ideal secret sharing schemes. Design Code Cryptogr, 2001, 24: 49–67

    Article  Google Scholar 

  13. Herzog J, Hibi T. Discrete polymatroids. J Algebr Comb, 2002, 16: 239–268

    Article  Google Scholar 

  14. Farras O, Martí-Farré J, Padró C. Ideal multipartite secret sharing schemes. In: Proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Barcelona, Spain: Springer, 2007. 4515: 448–465

    Google Scholar 

  15. Ng S-L. Ideal secret sharing schemes with multipartite access structures. IET Commun, 2006, 153: 165–168

    Google Scholar 

  16. Oxley J G. Matroid Theory. New York: Clarendon/Oxford University Press, 1992

    Google Scholar 

  17. Welsh D J A. Matroid Theory. London: Academic Press, 1976

    Google Scholar 

  18. Herzog J, Hibi T. Discrete polymatroids. J Algebr Comb, 2002, 16: 239–268

    Article  Google Scholar 

  19. Padro C, Saez G. Secret sharing schemes with bipartite access structure. IEEE T Inform Theory, 2000, 46: 2596–2604

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to XueMing Tang.

About this article

Cite this article

Hsu, C., Tang, X., Cheng, Q. et al. Multipartite matroids and secret sharing. Chin. Sci. Bull. 55, 3261–3266 (2010). https://doi.org/10.1007/s11434-010-3086-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11434-010-3086-7

Keywords

Navigation