- 5
- 0
- 约10.3万字
- 约 102页
- 2019-05-26 发布于上海
- 举报
IV
IV
Abstract
With the widespread application and development of information security technology, secret sharing schemes have been widely applied for a variety of cryptography procotols, in which ideal secret sharing schemes have optimal efficiency. The structures realized by ideal secret sharing schemes are called ideal access structures. Not all access structures are ideal since there does not exist an ideal secret sharing scheme realizing it, namely, they are non-ideal access structures. Thus, the characterization of ideal access structures is a longstanding open problem in secret sharing, which has interesting connection to martoid theory since all access structures induced by representable matroids are ideal. By using the well known connection between ideal secret sharing and matroids, several researchers study the characterization of ideal access structures and further construct ideal secret sharing schemes for particular families of access structures.
Due to the fact that every access structure and matroid are multipartite, by using the connection between multipartite matroids and discrete polymatroids, we study the bases and the rank functions of discrete polymatroids. As a result, we obtain multiple sufficient or necessary conditions for a multipartite matroid to be representable or non-representable, which imply multiple sufficient or necessary conditions for an access structure to be ideal. Subsequently, by applyng these conclusions for two particular families of access structures, we build an ideal threshold secret sharing protocol for member expansion and an ideal multi-secret sharing scheme based on connectivity of graphs respectively.
Since the representability of a muliparite matroid can be completely characterized by the representability of the associated discrete polymatroid which is completely determined by its rank function, by dealing the rank functions of discrete polymatroids, we define D-reduction discrete polymatroids such that multiple d
您可能关注的文档
- 绵阳移动合同管理系统设计与实现-软件工程专业毕业论文.docx
- 面向环境监测的RFID传感器网络节点定位算法研究-计算机应用技术专业毕业论文.docx
- 面向大数据的网络安全分析方法-软件工程专业毕业论文.docx
- 马克思的异化理论视阈下的《我们共同的朋友》-英语语言文学专业毕业论文.docx
- 面向多雇主的需求优选系统的设计与实现-计算机技术专业毕业论文.docx
- 控失肥对抗虫杂交棉若干理化特性及产量的影响-作物栽培学与耕作学专业毕业论文.docx
- 空间数据库中GRkNN查询研究-计算机应用技术专业毕业论文.docx
- 骆驼喉蛆病流行病学及对机体氧化应激的研究-临床兽医学专业毕业论文.docx
- 锰超富集植物青葙同源多倍体诱导及修复性能研究-市政工程专业毕业论文.docx
- 煤矿安全生产监控系统软件的设计-软件工程专业毕业论文.docx
- 罗山县农村土地流转模式与绩效评价研究-公共管理专业毕业论文.docx
- 镁铜锌铁氧体的制备、结构和性能的研究-材料物理与化学专业毕业论文.docx
- 美国著名体育记者格兰特拉德·赖斯及其作品研究-体育学专业毕业论文.docx
- 考虑电动汽车充电站和风电的谐波分析及谐波源识别研究-电力系统及其自动化专业毕业论文.docx
- 马克思异化劳动理论研究-马克思主义哲学专业毕业论文.docx
- 面向绿色制造的工艺规划决策分析-机械工程专业毕业论文.docx
- 面向智能家居的设备资源模型的研究-计算机技术专业毕业论文.docx
- 面向无线网络的在线离线数字签名的研究-计算机软件与理论专业毕业论文.docx
- 滤波与推估在建筑物变形分析中的应用研究-测绘科学与技术专业毕业论文.docx
- 酶解虾副产物制备ACE抑制肽-食品科学与工程专业毕业论文.docx
原创力文档

文档评论(0)