F Matus - IEEE Transactions on Information Theory, 2006 - ieeexplore.ieee.org
The correspondence between the subvectors of a random vector and their Shannon entropies gives rise to an entropy function. Limits of the entropy functions are closed to …
Multipartite secret sharing schemes are those having a multipartite access structure, in which the set of participants is divided into several parts and all participants in the same part …
C Padró - Cryptology ePrint Archive, 2012 - eprint.iacr.org
These are basically the lecture notes for the short course" Applications of Combinatorics to Information-Theoretic Cryptography", Central European University, Budapest, May-June …
A Beimel, N Livne, C Padró - Theory of Cryptography Conference, 2008 - Springer
In a secret-sharing scheme, a secret value is distributed among a set of parties by giving each party a share. The requirement is that only predefined subsets of parties can recover …
We present a new improvement in the linear programming technique to derive lower bounds on the information ratio of secret sharing schemes. We obtain non-Shannon-type bounds …
A Beimel, O Farràs, Y Mintz - Journal of Cryptology, 2016 - Springer
A secret-sharing scheme realizes a graph if every two vertices connected by an edge can reconstruct the secret while every independent set in the graph does not get any information …
We present a new improvement in the linear programming technique to derive lower bounds on the information ratio of secret sharing schemes. We obtain non-Shannon-type bounds …
One of the main open problems in secret sharing is the characterization of the access structures of ideal secret sharing schemes. As a consequence of the results by Brickell and …
CM Bai, ZH Li, TT Xu, YM Li - International Journal of Theoretical Physics, 2016 - Springer
An information theoretical model for quantum secret sharing was introduced by H. Imai et al.(Quantum Inf. Comput. 5 (1), 69–80 2005), which was analyzed by quantum information …