The main results of this paper are theorems which provide a solution to the open problem posed by Tassa [1]. He considers a specific family Γν of hierarchical threshold access structures and shows that two extreme members Γ and Γv of Γν are realized by secret sharing schemes which are ideal and perfect. The question posed by Tassa is whether the other members of Γν can be realized by ideal and perfect schemes as well. We show that the answer in general is negative. A precise definition of secret sharing scheme introduced by Brickell and Davenport in [2] combined with a connection between schemes and matroids are crucial tools used in this paper. Brickell and Davenport describe secret sharing scheme as a matrix M with n+1 columns, where n d...
summary:A secret sharing scheme is ideal if the size of each share is equal to the size of the secre...
In this paper, we introduce the notion of a joint compartmented threshold access structure (JCTAS). ...
summary:A secret sharing scheme is ideal if the size of each share is equal to the size of the secre...
The main results of this paper are theorems which provide a solution to the open problem posed by Ta...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
We present new families of access structures that, similarly to the multilevel and compartmented acc...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret sharing. In...
© 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
A secret sharing scheme divides a secret into multiple shares by a dealer and shared among sharehold...
In the history of secret sharing schemes many constructions are based on geometric objects. In this ...
The final publication is available at Springer via http://dx.doi.org/10.1007/s00453-016-0217-9A secr...
summary:A secret sharing scheme is ideal if the size of each share is equal to the size of the secre...
In this paper, we introduce the notion of a joint compartmented threshold access structure (JCTAS). ...
summary:A secret sharing scheme is ideal if the size of each share is equal to the size of the secre...
The main results of this paper are theorems which provide a solution to the open problem posed by Ta...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
We present new families of access structures that, similarly to the multilevel and compartmented acc...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret sharing. In...
© 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
A secret sharing scheme divides a secret into multiple shares by a dealer and shared among sharehold...
In the history of secret sharing schemes many constructions are based on geometric objects. In this ...
The final publication is available at Springer via http://dx.doi.org/10.1007/s00453-016-0217-9A secr...
summary:A secret sharing scheme is ideal if the size of each share is equal to the size of the secre...
In this paper, we introduce the notion of a joint compartmented threshold access structure (JCTAS). ...
summary:A secret sharing scheme is ideal if the size of each share is equal to the size of the secre...