35 research outputs found

    Finding lower bounds on the complexity of secret sharing schemes by linear programming

    Get PDF
    Optimizing the maximum, or average, length of the shares in relation to the length of the secret for every given access structure is a difficult and long-standing open problem in cryptology. Most of the known lower bounds on these parameters have been obtained by implicitly or explicitly using that every secret sharing scheme defines a polymatroid related to the access structure. The best bounds that can be obtained by this combinatorial method can be determined by using linear programming, and this can be effectively done for access structures on a small number of participants. By applying this linear programming approach, we improve some of the known lower bounds for the access structures on five participants and the graph access structures on six participants for which these parameters were still undetermined. Nevertheless, the lower bounds that are obtained by this combinatorial method are not tight in general. For some access structures, they can be improved by adding to the linear program non-Shannon information inequalities as new constraints. We obtain in this way new separation results for some graph access structures on eight participants and for some ports of non-representable matroids. Finally, we prove that, for two access structures on five participants, the combinatorial lower bound cannot be attained by any linear secret sharing schemePeer ReviewedPostprint (author's final draft

    On the Fundamental Limits and Symmetric Designs for Distributed Information Systems

    Get PDF
    Many multi-terminal communication networks, content delivery networks, cache networks, and distributed storage systems can be modeled as a broadcast network. An explicit characterization of the capacity region of the general network coding problem is one of the best known open problems in network information theory. A simple set of bounds that are often used in the literature to show that certain rate tuples are infeasible are based on the graph-theoretic notion of cut. The standard cut-set bounds, however, are known to be loose in general when there are multiple messages to be communicated in the network. This dissertation focuses on broadcast networks, for which the standard cut-set bounds are closely related to union as a specific set operation to combine different simple cuts of the network. A new set of explicit network coding bounds, which combine different simple cuts of the network via a variety of set operations (not just the union), are established via their connections to extremal inequalities for submodular functions. The tightness of these bounds are demonstrated via applications to combination networks. The tightness of generalized cut-set bounds has been further explored by studying the problem of “latency capacity region” for a broadcast channel. An implicit characterization of this region has been proved by Tian, where a rate splitting based scheme was shown to be optimal. However, the explicit characterization of this region was only available when the number of receivers are less than three. In this dissertation, a precise polyhedral description of this region for a symmetric broadcast channel with complete message set and arbitrary number of users has been established. It has been shown that a set of generalized cut-set bounds, characterizes the entire symmetrical multicast region. The achievability part is proved by showing that every maximum rate vector is feasible by using a successive encoding scheme. The framework for achievability strongly relies on polyhedral combinatorics and it can be useful in network information theory problems when a polyhedral description of a region is needed. Moreover, it is known that there is a direct relationship between network coding solution and characterization of entropy region. This dissertation, also studies the symmetric structures in network coding problems and their relation with symmetrical projections of entropy region and introduces new aspects of entropy inequalities. First, inequalities relating average joint entropies rather than entropies over individual subsets are studied. Second, the existence of non-Shannon type inequalities under partial symmetry is studied using the concepts of Shannon and non-Shannon groups. Finally, due to the relationship between linear entropic vectors and representability of integer polymatroids, construction of such vector has been discussed. Specifically, It is shown that representability of the particularly constructed matroid is a sufficient condition for integer polymatroids to be linearly representable over real numbers. Furthermore, it has been shown that any real-valued submodular function (such as Shannon entropy) can be approximated (arbitrarily close) by an integer polymatroid

    Entropy Region and Convolution

    Get PDF
    The entropy region is constructed from vectors of random variables by collecting Shannon entropies of all subvectors. Its shape is studied here by means of polymatroidal constructions, notably by convolution. The closure of the region is decomposed into the direct sum of tight and modular parts, reducing the study to the tight part. The relative interior of the reduction belongs to the entropy region. Behavior of the decomposition under self-adhesivity is clarified. Results are specialized and extended to the region constructed from four tuples of random variables. This and computer experiments help to visualize approximations of a symmetrized part of the entropy region. The four-atom conjecture on the minimal Ingleton score is refuted. © 2016 IEEE

    Secret sharing schemes: Optimizing the information ratio

    Get PDF
    Secret sharing refers to methods used to distribute a secret value among a set of participants. This work deals with the optimization of two parameters regarding the efficiency of a secret sharing scheme: the information ratio and average information ratio. Only access structures (a special family of sets) on 5 and 6 participants will be considered. First, access structures with 5 participants will be studied, followed by the ones on 6 participants that are based on graphs. The main goal of the paper is to check existing lower bounds (and improve some of them) by using linear programs with the sage solver. Shannon information inequalities have been used to translate the polymatroid axioms into linear constraints
    corecore