On linear secret sharing for connectivity in directed graphs

Amos Beimel, Anat Paskin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

In this work we study linear secret sharing schemes for s-t connectivity in directed graphs. In such schemes the parties are edges of a complete directed graph, and a set of parties (i.e., edges) can reconstruct the secret if it contains a path from node s to node t. We prove that in every linear secret sharing scheme realizing the st-con function on a directed graph with n edges the total size of the shares is Ω(n 1.5). This should be contrasted with s-t connectivity in undirected graphs, where there is a scheme with total share size n. Our result is actually a lower bound on the size monotone span programs for st∈-∈con, where a monotone span program is a linear-algebraic model of computation equivalent to linear secret sharing schemes. Our results imply the best known separation between the power of monotone and non-monotone span programs. Finally, our results imply the same lower bounds for matching.

Original languageEnglish
Title of host publicationSecurity and Cryptography for Networks - 6th International Conference, SCN 2008, Proceedings
Pages172-184
Number of pages13
DOIs
StatePublished - 2008
Externally publishedYes
Event6th International Conference on Security and Cryptography for Networks, SCN 2008 - Amalfi, Italy
Duration: 10 Sep 200812 Sep 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5229 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Conference on Security and Cryptography for Networks, SCN 2008
Country/TerritoryItaly
CityAmalfi
Period10/09/0812/09/08

Fingerprint

Dive into the research topics of 'On linear secret sharing for connectivity in directed graphs'. Together they form a unique fingerprint.

Cite this