Given a set of participants that is partitioned into distinct compartments, a multi-partite access structure is an access structure that does not distinguish between partici-pants that belong to the same compartment. We examine here three types of such access structures: two that were studied before – compartmented access structures and hierar-chical threshold access structures, and a new type of compartmented access structures that we present herein. We design ideal perfect secret sharing schemes for these types of access structures that are based on bivariate interpolation. The secret sharing schemes for the two types of compartmented access structures are based on bivariate Lagrange interpolation with data on parallel lines. The secret s...
© 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
[[abstract]]A multi-secret sharing scheme is a natural generalization of the secret sharing scheme. ...
The paper proposes efficient solutions to two long standing open problems related to secret sharing ...
Abstract Secret sharing schemes have been well studied and widely used in different aspects of real ...
Quite recently, Tassa introduced an ideal and perfect secret sharing scheme realizing conjunctive hi...
A Secret sharing scheme is a method for dividing a secret into several partial information. The secr...
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such s...
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such s...
A Secret sharing scheme is a method for dividing a secret into several partialinformation. The secre...
A secret sharing scheme is one of cryptographies. A threshold scheme, which is introduced by Shamir ...
Abstract. We consider the problem of threshold secret sharing in groups with hierarchical structure....
Bipartite secret sharing schemes have a bipartite access structure in which the set of participants ...
Abstract Multilevel and compartmented access structures are two important classes of access structur...
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
We present new families of access structures that, similarly to the multilevel and compartmented acc...
© 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
[[abstract]]A multi-secret sharing scheme is a natural generalization of the secret sharing scheme. ...
The paper proposes efficient solutions to two long standing open problems related to secret sharing ...
Abstract Secret sharing schemes have been well studied and widely used in different aspects of real ...
Quite recently, Tassa introduced an ideal and perfect secret sharing scheme realizing conjunctive hi...
A Secret sharing scheme is a method for dividing a secret into several partial information. The secr...
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such s...
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such s...
A Secret sharing scheme is a method for dividing a secret into several partialinformation. The secre...
A secret sharing scheme is one of cryptographies. A threshold scheme, which is introduced by Shamir ...
Abstract. We consider the problem of threshold secret sharing in groups with hierarchical structure....
Bipartite secret sharing schemes have a bipartite access structure in which the set of participants ...
Abstract Multilevel and compartmented access structures are two important classes of access structur...
In a t,n threshold secret sharing (SS) scheme, whether or not a shareholder set is an authorized set...
We present new families of access structures that, similarly to the multilevel and compartmented acc...
© 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
[[abstract]]A multi-secret sharing scheme is a natural generalization of the secret sharing scheme. ...
The paper proposes efficient solutions to two long standing open problems related to secret sharing ...