Secret sharing, which refers to methods of distributing a secret value among a group of participants, is a very important primitive in cryptology. This thesis contains some contribution to this topic. The results that are presented herein deal with two of the main open problems in secret sharing: the characterization of the ideal access structures and the optimization of the length of the shares. For both open problems, polymatroids are a powerful tool. On one hand, ideal multipartite secret sharing schemes are strongly connected to polymatroids. On the other hand, the entropies of shares of a scheme determine a polymatroid, and because of that, they are fundamental in the search of lower bounds of the length of the shares. For the first op...
We present new families of access structures that, similarly to the multilevel and compartmented acc...
The final publication is available at Springer via http://dx.doi.org/10.1007/s00453-016-0217-9A secr...
A secret sharing scheme is non-perfect if some subsets of participants that cannot recover the secre...
Secret sharing, which refers to methods of distributing a secret value among a group of participants...
The complexity of a secret sharing scheme is defined as the ratio between the maximum length of the ...
The complexity of a secret sharing scheme is defined as the ratio between the maximum length of the ...
The complexity of a secret sharing scheme is defined as the ratio between the maximum length of the ...
Optimizing the ratio between the maximum length of the shares and the length of the secret value in ...
Optimizing the ratio between the maximum length of the shares and the length of the secret value in ...
Optimizing the ratio between the maximum length of the shares and the length of the secret value in ...
Optimizing the ratio between the maximum length of the shares and the length of the secret value in ...
Multipartite secret sharing schemes are those having a multipartite access structure, in which the s...
Optimizing the ratio between the maximum length of the shares and the length of the secret value in ...
This thesis is dedicated to the study of secret sharing schemes, which are cryptographic methods to ...
This thesis is dedicated to the study of secret sharing schemes, which are cryptographic methods to ...
We present new families of access structures that, similarly to the multilevel and compartmented acc...
The final publication is available at Springer via http://dx.doi.org/10.1007/s00453-016-0217-9A secr...
A secret sharing scheme is non-perfect if some subsets of participants that cannot recover the secre...
Secret sharing, which refers to methods of distributing a secret value among a group of participants...
The complexity of a secret sharing scheme is defined as the ratio between the maximum length of the ...
The complexity of a secret sharing scheme is defined as the ratio between the maximum length of the ...
The complexity of a secret sharing scheme is defined as the ratio between the maximum length of the ...
Optimizing the ratio between the maximum length of the shares and the length of the secret value in ...
Optimizing the ratio between the maximum length of the shares and the length of the secret value in ...
Optimizing the ratio between the maximum length of the shares and the length of the secret value in ...
Optimizing the ratio between the maximum length of the shares and the length of the secret value in ...
Multipartite secret sharing schemes are those having a multipartite access structure, in which the s...
Optimizing the ratio between the maximum length of the shares and the length of the secret value in ...
This thesis is dedicated to the study of secret sharing schemes, which are cryptographic methods to ...
This thesis is dedicated to the study of secret sharing schemes, which are cryptographic methods to ...
We present new families of access structures that, similarly to the multilevel and compartmented acc...
The final publication is available at Springer via http://dx.doi.org/10.1007/s00453-016-0217-9A secr...
A secret sharing scheme is non-perfect if some subsets of participants that cannot recover the secre...