• DocumentCode
    1232503
  • Title

    On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes

  • Author

    Cramer, Ronald ; Daza, Vanesa ; Gracia, Ignacio ; Urroz, Jorge Jiménez ; Leander, Gregor ; Martí-Farré, Jaume ; Padró, Carles

  • Author_Institution
    CWI, Amsterdam
  • Volume
    54
  • Issue
    6
  • fYear
    2008
  • fDate
    6/1/2008 12:00:00 AM
  • Firstpage
    2644
  • Lastpage
    2657
  • Abstract
    Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, the connections between codes, matroids, and a special class of secret sharing schemes, namely, multiplicative linear secret sharing schemes (LSSSs), are studied. Such schemes are known to enable multiparty computation protocols secure against general (nonthreshold) adversaries. Two open problems related to the complexity of multiplicative LSSSs are considered in this paper. The first one deals with strongly multiplicative LSSSs. As opposed to the case of multiplicative LSSSs, it is not known whether there is an efficient method to transform an LSSS into a strongly multiplicative LSSS for the same access structure with a polynomial increase of the complexity. A property of strongly multiplicative LSSSs that could be useful in solving this problem is proved. Namely, using a suitable generalization of the well-known Berlekamp-Welch decoder, it is shown that all strongly multiplicative LSSSs enable efficient reconstruction of a shared secret in the presence of malicious faults. The second one is to characterize the access structures of ideal multiplicative LSSSs. Specifically, the considered open problem is to determine whether all self-dual vector space access structures are in this situation. By the aforementioned connection, this in fact constitutes an open problem about matroid theory, since it can be restated in terms of representability of identically self-dual matroids by self-dual codes. A new concept is introduced, the flat-partition, that provides a useful classification of identically self-dual matroids. Uniform identically self-dual matroids, which are known to be representable by self-dual codes, form one of the classes. It is proved that this property also holds for the family of matroids that, in a natural way, is the next class in the above classification: the identically self-dual bipartite matroids.
  • Keywords
    computational complexity; cryptographic protocols; cryptography; decoding; dual codes; error correction codes; linear codes; matrix algebra; Berlekamp-Welch decoder; computational complexity; error-correcting code; matroid theory; multiplicative linear secret sharing scheme; secure multiparty computation protocol; self-dual codes; self-dual matroids; self-dual vector space access structure; Books; Cryptography; Decoding; Error correction codes; Galois fields; Information security; Linear code; Polynomials; Protocols; Vectors; Efficient error correction; multiparty computation; multiplicative linear secret sharing schemes; self-dual codes; self-dual matroids;
  • fLanguage
    English
  • Journal_Title
    Information Theory, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    0018-9448
  • Type

    jour

  • DOI
    10.1109/TIT.2008.921692
  • Filename
    4529268