Ideal hierarchical secret sharing schemes
From MaRDI portal
Publication:3408196
DOI10.1007/978-3-642-11799-2_14zbMATH Open1274.94134OpenAlexW2118981186MaRDI QIDQ3408196FDOQ3408196
Authors: Oriol Farràs, Carles Padró
Publication date: 24 February 2010
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-11799-2_14
Recommendations
secret sharinginteger polymatroidsmultipartite secret sharingideal secret sharing schemeshierarchical secret sharingweighted threshold secret sharingmultipartite matroids
Cites Work
- Discrete Convex Analysis
- Title not available (Why is that?)
- How to share a secret
- A Solution of the Shannon Switching Game
- On the classification of ideal secret sharing schemes
- Matroid representations by partitions
- An explication of secret sharing schemes
- On the size of shares for secret sharing schemes
- On secret sharing systems
- The size of a share must be large
- Secret sharing schemes with bipartite access structure
- Title not available (Why is that?)
- Title not available (Why is that?)
- On Secret Sharing Schemes, Matroids and Polymatroids
- Ideal Multipartite Secret Sharing Schemes
- Monotone circuits for monotone weighted threshold functions
- Discrete polymatroids
- A FORBIDDEN MINOR CHARACTERIZATION OF MATROID PORTS
- Multipartite secret sharing by bivariate interpolation
- A representation of a family of secret sharing matroids
- Weighted threshold secret sharing schemes
- Ideal secret sharing schemes with multipartite access structures
- Characterizing Ideal Weighted Threshold Secret Sharing
- On the composition of matroids and ideal secret sharing schemes
- Hierarchical threshold secret sharing
- Discrete convex analysis
- Two Constructions on Limits of Entropy Functions
- Ideal secret sharing schemes whose minimal qualified subsets have at most three participants
- Correction to “Secret Sharing Schemes With Bipartite Access Structure”
Cited In (18)
- Title not available (Why is that?)
- Efficient integer span program for hierarchical threshold access structure
- Threshold secret sharing through multivariate Birkhoff interpolation
- Natural generalizations of threshold secret sharing
- Optimal complexity of secret sharing schemes with four minimal qualified subsets
- Theory of Cryptography
- A novel group key transfer for big data security
- Ideal multipartite secret sharing schemes
- Ideal Multipartite Secret Sharing Schemes
- Hierarchical threshold secret sharing
- Operations over linear secret sharing schemes
- Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness
- A characterisation of ideal weighted secret sharing schemes
- Hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer
- Ideal secret sharing schemes for useful multipartite access structures
- A remark on hierarchical threshold secret sharing
- Ideal hierarchical secret sharing and lattice path matroids
- Generalized threshold secret sharing and finite geometry
This page was built for publication: Ideal hierarchical secret sharing schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3408196)