85,962 research outputs found
Matroids and Quantum Secret Sharing Schemes
A secret sharing scheme is a cryptographic protocol to distribute a secret
state in an encoded form among a group of players such that only authorized
subsets of the players can reconstruct the secret. Classically, efficient
secret sharing schemes have been shown to be induced by matroids. Furthermore,
access structures of such schemes can be characterized by an excluded minor
relation. No such relations are known for quantum secret sharing schemes. In
this paper we take the first steps toward a matroidal characterization of
quantum secret sharing schemes. In addition to providing a new perspective on
quantum secret sharing schemes, this characterization has important benefits.
While previous work has shown how to construct quantum secret sharing schemes
for general access structures, these schemes are not claimed to be efficient.
In this context the present results prove to be useful; they enable us to
construct efficient quantum secret sharing schemes for many general access
structures. More precisely, we show that an identically self-dual matroid that
is representable over a finite field induces a pure state quantum secret
sharing scheme with information rate one
Optimal non-perfect uniform secret sharing schemes
A secret sharing scheme is non-perfect if some subsets of participants that cannot recover the secret value have partial information about it. The information ratio of a secret sharing scheme is the ratio between the maximum length of the shares and the length of the secret. This work is dedicated to the search of bounds on the information ratio of non-perfect secret sharing schemes. To this end, we extend the known connections between polymatroids and perfect secret sharing schemes to the non-perfect case. In order to study non-perfect secret sharing schemes in all generality, we describe their structure through their access function, a real function that measures the amount of information that every subset of participants obtains about the secret value. We prove that there exists a secret sharing scheme for every access function. Uniform access functions, that is, the ones whose values depend only on the number of participants, generalize the threshold access structures. Our main result is to determine the optimal information ratio of the uniform access functions. Moreover, we present a construction of linear secret sharing schemes with optimal information ratio for the rational uniform access functions.Peer ReviewedPostprint (author's final draft
Non-Threshold Quantum Secret Sharing Schemes in the Graph State Formalism
In a recent work, Markham and Sanders have proposed a framework to study
quantum secret sharing (QSS) schemes using graph states. This framework unified
three classes of QSS protocols, namely, sharing classical secrets over private
and public channels, and sharing quantum secrets. However, most work on secret
sharing based on graph states focused on threshold schemes. In this paper, we
focus on general access structures. We show how to realize a large class of
arbitrary access structures using the graph state formalism. We show an
equivalence between binary quantum codes and graph state secret
sharing schemes sharing one bit. We also establish a similar (but restricted)
equivalence between a class of Calderbank-Shor-Steane (CSS) codes and
graph state QSS schemes sharing one qubit. With these results we are able to
construct a large class of quantum secret sharing schemes with arbitrary access
structures.Comment: LaTeX, 6 page
Fourier-based Function Secret Sharing with General Access Structure
Function secret sharing (FSS) scheme is a mechanism that calculates a
function f(x) for x in {0,1}^n which is shared among p parties, by using
distributed functions f_i:{0,1}^n -> G, where G is an Abelian group, while the
function f:{0,1}^n -> G is kept secret to the parties. Ohsawa et al. in 2017
observed that any function f can be described as a linear combination of the
basis functions by regarding the function space as a vector space of dimension
2^n and gave new FSS schemes based on the Fourier basis. All existing FSS
schemes are of (p,p)-threshold type. That is, to compute f(x), we have to
collect f_i(x) for all the distributed functions. In this paper, as in the
secret sharing schemes, we consider FSS schemes with any general access
structure. To do this, we observe that Fourier-based FSS schemes by Ohsawa et
al. are compatible with linear secret sharing scheme. By incorporating the
techniques of linear secret sharing with any general access structure into the
Fourier-based FSS schemes, we show Fourier-based FSS schemes with any general
access structure.Comment: 12 page
- …