Generalized oblivious transfer by secret sharing

T Tassa - Designs, Codes and Cryptography, 2011 - Springer
Abstract The notion of Generalized Oblivious Transfer (GOT) was introduced by Ishai and
Kushilevitz (Proceeding of ISTCS97, IEEE Computer Society, pp 174–184, 1997). In a GOT …

Lecture notes in secret sharing

C Padró - Cryptology ePrint Archive, 2012 - eprint.iacr.org
These are basically the lecture notes for the short course" Applications of Combinatorics to
Information-Theoretic Cryptography", Central European University, Budapest, May-June …

On the information ratio of non-perfect secret sharing schemes

O Farràs, TB Hansen, T Kaced, C Padró - Algorithmica, 2017 - Springer
A secret sharing scheme is non-perfect if some subsets of players that cannot recover the
secret value have partial information about it. The information ratio of a secret sharing …

Improving the linear programming technique in the search for lower bounds in secret sharing

O Farràs, T Kaced, S Martín, C Padró - … on the Theory and Applications of …, 2018 - Springer
We present a new improvement in the linear programming technique to derive lower bounds
on the information ratio of secret sharing schemes. We obtain non-Shannon-type bounds …

Natural generalizations of threshold secret sharing

O Farras, C Padró, C Xing… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
We present new families of access structures that, similarly to the multilevel and
compartmented access structures introduced in previous works, are natural generalizations …

Secret sharing, rank inequalities, and information inequalities

S Martin, C Padró, A Yang - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
Beimel and Orlov proved that all information inequalities on four or five variables, together
with all information inequalities on more than five variables that are known to date, provide …

Improving the linear programming technique in the search for lower bounds in secret sharing

O Farràs, T Kaced, S Martín… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We present a new improvement in the linear programming technique to derive lower bounds
on the information ratio of secret sharing schemes. We obtain non-Shannon-type bounds …

Entropy bounds for conjunctive queries with functional dependencies

T Gogacz, S Toruńczyk - arXiv preprint arXiv:1512.01808, 2015 - arxiv.org
We study the problem of finding the worst-case bound for the size of the result $ Q (\mathbb
{D}) $ of a fixed conjunctive query $ Q $ applied to a database $\mathbb {D} $ satisfying …

[HTML][HTML] Finding lower bounds on the complexity of secret sharing schemes by linear programming

C Padró, L Vázquez, A Yang - Discrete applied mathematics, 2013 - Elsevier
Optimizing the maximum, or average, length of the shares in relation to the length of the
secret for every given access structure is a difficult and long-standing open problem in …

[HTML][HTML] Optimal linear secret sharing schemes for graph access structures on six participants

M Gharahi, S Khazaei - Theoretical Computer Science, 2019 - Elsevier
The efficiency of a secret sharing scheme is measured via its information ratio. The optimal
information ratio (OIR) of an access structure is the infimum of the information ratios of all …