منابع مشابه
Ideal Secret Sharing Schemes for Useful Multipartite Access Structures
This paper is a survey of the main results and open problems in a line of work that was initiated shortly after secret sharing was introduced. Namely, the construction of ideal linear secret sharing schemes for access structures that are natural generalizations of the threshold ones and have interesting properties for the applications. Some of them have hierarchical properties, while other ones...
متن کاملIdeal secret sharing schemes with multipartite access structures
The concept of quasi-threshold multipartite access structures for secret sharing schemes is introduced. These access structures allow one distinguished class of participants to retain control over the reconstruction of the secret, while allowing flexibility over the quorum of participants from other classes. While ideal bipartite access structures have been classified, the case for multipartite...
متن کاملUniversally ideal secret-sharing schemes
Abstmct-Given a set of parties {l,. , n ) , an access structure is a monotone collection of subsets of the parties. For a certain domain of secrets, a secret-sharing scheme for an access structure is a method for a dealer to distribute shares to the parties. These shares enable subsets in the access structure to reconstruct the secret, while subsets not in the access structure get no informatio...
متن کاملUniversally Ideal Secret Sharing Schemes
17 graph. The cuts of G are the minimal dependent sets of a matroid T ? (G) on the edge set E. A matroid T is cographic if there exists some graph G such that T is isomorphic to the cut matroid T ? (G). Every cographic matroid is representable over any eld 18]. Therefore if an access structure A has a cographic appropriate matroid, then A is universally ideal. Unlike graphic matroids, we do not...
متن کاملSecret sharing schemes for Multipartite access structures
Information security has become much more important since electronic communication is started to be used in our daily life. The content of the term information security varies according to the type and the requirements of the area. Secret sharing schemes are introduced to solve the problems for securing sensitive information. In this paper, we review our proposed hierarchical and compartmented ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cryptology
سال: 2011
ISSN: 0933-2790,1432-1378
DOI: 10.1007/s00145-011-9101-6