Title
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes
Abstract
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, the connections between codes, matroids, and a special class of secret sharing schemes, namely, multiplicative linear secret sharing schemes (LSSSs), are studied. Such schemes are known to enable multiparty computation protocols secure against general (nonthreshold) adversaries. Two open problems related to the complexity of multiplicative LSSSs are considered in this paper. The first one deals with strongly multiplicative LSSSs. As opposed to the case of multiplicative LSSSs, it is not known whether there is an efficient method to transform an LSSS into a strongly multiplicative LSSS for the same access structure with a polynomial increase of the complexity. A property of strongly multiplicative LSSSs that could be useful in solving this problem is proved. Namely, using a suitable generalization of the well-known Berlekamp-Welch decoder, it is shown that all strongly multiplicative LSSSs enable efficient reconstruction of a shared secret in the presence of malicious faults. The second one is to characterize the access structures of ideal multiplicative LSSSs. Specifically, the considered open problem is to determine whether all self-dual vector space access structures are in this situation. By the aforementioned connection, this in fact constitutes an open problem about matroid theory, since it can be restated in terms of representability of identically self-dual matroids by self-dual codes. A new concept is introduced, the flat-partition, that provides a useful classification of identically self-dual matroids. Uniform identically self-dual matroids, which are known to be representable by self-dual codes, form one of the classes. It is proved that this property also holds for the family of matroids that, in a natural way, is the next class in the above classification: the identically self-dual bipartite matroids.
Year
DOI
Venue
2008
10.1109/TIT.2008.921692
IEEE Transactions on Information Theory
Keywords
Field
DocType
computational complexity,cryptographic protocols,cryptography,decoding,dual codes,error correction codes,linear codes,matrix algebra,Berlekamp-Welch decoder,computational complexity,error-correcting code,matroid theory,multiplicative linear secret sharing scheme,secure multiparty computation protocol,self-dual codes,self-dual matroids,self-dual vector space access structure,Efficient error correction,multiparty computation,multiplicative linear secret sharing schemes,self-dual codes,self-dual matroids
Matroid,Discrete mathematics,Combinatorics,Secure multi-party computation,Secret sharing,Open problem,Multiplicative function,Computer science,Shared secret,Access structure,Computational complexity theory
Journal
Volume
Issue
ISSN
54
6
0018-9448
Citations 
PageRank 
References 
26
1.31
26
Authors
4
Name
Order
Citations
PageRank
Cramer, R.1261.31
Vanesa Daza221120.62
Gracia, I.3261.31
Urroz, J.J.4261.31