Sciweavers

40 search results - page 3 / 8
» Secret Sharing with Access Structures in a Hierarchy
Sort
View
TCC
2007
Springer
89views Cryptology» more  TCC 2007»
13 years 12 months ago
On Secret Sharing Schemes, Matroids and Polymatroids
Abstract. One of the main open problems in secret sharing is the characterization of the access structures of ideal secret sharing schemes. As a consequence of the results by Brick...
Jaume Martí-Farré, Carles Padr&oacut...
CISC
2007
Springer
108views Cryptology» more  CISC 2007»
13 years 9 months ago
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. In 2005, Shao and Cao developed a verifiable multi-secret sharing scheme where e...
Christophe Tartary, Josef Pieprzyk, Huaxiong Wang
TCC
2007
Springer
86views Cryptology» more  TCC 2007»
13 years 12 months ago
Weakly-Private Secret Sharing Schemes
Abstract. Secret-sharing schemes are an important tool in cryptography that is used in the construction of many secure protocols. However, the shares’ size in the best known secr...
Amos Beimel, Matthew K. Franklin
TPDS
1998
94views more  TPDS 1998»
13 years 5 months ago
Access Control and Signatures via Quorum Secret Sharing
—We suggest a method of controlling the access to a secure database via quorum systems. A quorum system is a collection of sets (quorums) every two of which have a nonempty inter...
Moni Naor, Avishai Wool
ICITS
2009
13 years 3 months ago
Linear Threshold Multisecret Sharing Schemes
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here un...
Oriol Farràs, Ignacio Gracia, Sebasti&agrav...