On the Composition of Matroids and Ideal Secret Sharing Schemes

In an ideal secret sharing scheme, the access structure is uniquely determined by its minimal sets Δs. The purpose of this paper is to characterise Δs. We introduce the concept of strong connectivity and show that under this equivalence relation, an ideal secret sharing scheme decomposes into threshold schemes. We also give a description of the minimal sets that span the strong connectivity classes. As a result we obtain a necessary condition on the types of subsets that are allowed in an ideal access structure as well as an upper bound on the number of such access structures.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  WEN-AI JACKSON,et al.  Perfect Secret Sharing Schemes on Five Participants , 1996, Des. Codes Cryptogr..

[3]  Douglas R. Stinson,et al.  An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..

[4]  Dominic J. A. Welsh,et al.  Codes and cryptography , 1988 .

[5]  Alexei E. Ashikhmin,et al.  Almost Affine Codes , 1998, Des. Codes Cryptogr..

[6]  Paul D. Seymour On secret-sharing matroids , 1992, J. Comb. Theory, Ser. B.

[7]  Keith M. Martin,et al.  Combinatorial models for perfect secret sharing schemes , 1998 .

[8]  Peter Wild,et al.  The Combinatorics of Perfect Authentication Schemes , 1994, SIAM J. Discret. Math..