2006
DOI: 10.1049/ip-com:20050073
|View full text |Cite
|
Sign up to set email alerts
|

Ideal secret sharing schemes with multipartite access structures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2007
2007
2011
2011

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(29 citation statements)
references
References 7 publications
0
29
0
Order By: Relevance
“…In addition, while these open problems have been previously studied for particular families of multipartite access structures [1,2,4,7,14,16,32,35,43,44], our approach makes it possible to state them in the most general possible way.…”
Section: Constructing Ideal Multipartite Secret Sharing Schemesmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition, while these open problems have been previously studied for particular families of multipartite access structures [1,2,4,7,14,16,32,35,43,44], our approach makes it possible to state them in the most general possible way.…”
Section: Constructing Ideal Multipartite Secret Sharing Schemesmentioning
confidence: 99%
“…Constructions of ideal secret sharing schemes for variants of the compartmented and multilevel access structures, and also for some tripartite access structures, have been given in [1,2,16,32,43,44]. All these constructions provide vector space secret sharing schemes, but some interesting new techniques are introduced in the ones by Tassa [43] and Tassa and Dyn [44].…”
Section: On the Construction Of Ideal Multipartite Secret Sharing Schmentioning
confidence: 99%
See 1 more Smart Citation
“…As an example we consider the quasi-threshold multipartite defining structures that were first described in [11]. Construction 4.6 Let P 1 , .…”
Section: Construction 45mentioning
confidence: 99%
“…By using different kinds of polynomial interpolation, Tassa [33], and Tassa and Dyn [34] proposed constructions of ideal secret sharing schemes for several families of multipartite access structures that contain the multilevel and compartmented ones. Other proposals of ideal multipartite secret sharing schemes have been given in [14,26]. All these constructions are based as well on the general linear algebra method by Brickell [6].…”
Section: Introductionmentioning
confidence: 99%