2007
DOI: 10.1007/s00145-006-0334-8
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical Threshold Secret Sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
206
0
1

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 205 publications
(223 citation statements)
references
References 17 publications
0
206
0
1
Order By: Relevance
“…We will show in this section that the Boolean circuits representing multilevel access structures [12,14] fulfill this property. For a compact representation of multilevel access structures we need Boolean circuits with threshold gates (as in [7]).…”
Section: Extensions and Applicationsmentioning
confidence: 88%
See 1 more Smart Citation
“…We will show in this section that the Boolean circuits representing multilevel access structures [12,14] fulfill this property. For a compact representation of multilevel access structures we need Boolean circuits with threshold gates (as in [7]).…”
Section: Extensions and Applicationsmentioning
confidence: 88%
“…we replace "∃" by "∀" in the above definition, we obtain the concept of conjunctive multilevel access structure [14]. It is well-known, and not difficult to prove (see Appendix 10), that disjunctive and conjunctive multilevel access structures cannot be represented by Boolean formulas.…”
Section: Extensions and Applicationsmentioning
confidence: 99%
“…Another paradigmatic example of access structure realizable by a monotone span program is the threshold hierarchical one, see Tassa [26]. Although we did not include any example, recall that our construction is also for non-ideal sss, that is, the monotone span program might have more than one row with the same label (this is important since there are not that many known instances of ideal sss for interesting access structures).…”
Section: Ifmentioning
confidence: 99%
“…These hierarchical structures are now called disjunctive, since only one of the m conditions must be satisfied for a coalition to be authorized. If all conditions must be satisfied, then the hierarchical access structure is called conjunctive (Tassa, 2007). A typical example of a conjunctive hierarchical game would be the United Nations Security Council where for the passage of a resolution all five permanent members must vote for it and also at least nine members in total.…”
Section: Introductionmentioning
confidence: 99%
“…Both disjunctive and conjunctive hierarchical access structures have been proved to be ideal (Brickell, 1990;Tassa, 2007) which means they can carry the most informationally efficient secret sharing scheme and be completely secure (i.e., not giving any information about the secret to unauthorized coalitions). Classification of ideal access structures proved to be extremely difficult problem and the focus of attention has moved to classification of ideal access structures in subclasses of access structures like weighted threshold access structures introduced by Shamir (1979).…”
Section: Introductionmentioning
confidence: 99%