Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, and it has attracted a lot of attention since the invention of secret sharing until nowadays. Several constructions of ideal hierarchical secret sharing schemes have been proposed, but it was not known what access structures admit such a scheme. We solve this problem by providing a natural definition for the family of the hierarchical access structures and, more importantly, by presenting a complete characterization of the ideal hierarchical access structures, that is, the ones admitting an ideal secret sharing scheme. Our characterization is based on the well-known connection between ideal secret sharing schemes and matroids and, more specifi...
In a secret-sharing scheme, a secret value is distributed among a set of parties by giving each part...
Secret-sharing schemes are a tool used in many cryptographic protocols. In these schemes, a dealer h...
Secret-sharing schemes are a tool used in many cryptographic protocols. In these schemes, a dealer h...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
We present new families of access structures that, similarly to the multilevel and compartmented acc...
Multipartite secret sharing schemes are those having a multipartite access structure, in which the s...
© 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret sharing. In...
© 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
In secret sharing, the exact characterization of ideal access structures is a longstanding open prob...
summary:A secret sharing scheme is ideal if the size of each share is equal to the size of the secre...
The characterization of the access structures of ideal secret sharing schemes is one of the main op...
In a secret-sharing scheme, a secret value is distributed among a set of parties by giving each part...
Secret-sharing schemes are a tool used in many cryptographic protocols. In these schemes, a dealer h...
Secret-sharing schemes are a tool used in many cryptographic protocols. In these schemes, a dealer h...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, a...
We present new families of access structures that, similarly to the multilevel and compartmented acc...
Multipartite secret sharing schemes are those having a multipartite access structure, in which the s...
© 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret sharing. In...
© 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
In secret sharing, the exact characterization of ideal access structures is a longstanding open prob...
summary:A secret sharing scheme is ideal if the size of each share is equal to the size of the secre...
The characterization of the access structures of ideal secret sharing schemes is one of the main op...
In a secret-sharing scheme, a secret value is distributed among a set of parties by giving each part...
Secret-sharing schemes are a tool used in many cryptographic protocols. In these schemes, a dealer h...
Secret-sharing schemes are a tool used in many cryptographic protocols. In these schemes, a dealer h...