2014
DOI: 10.1109/tit.2014.2300113
|View full text |Cite
|
Sign up to set email alerts
|

Natural Generalizations of Threshold Secret Sharing

Abstract: Abstract-We present new families of access structures that, similarly to the multilevel and compartmented access structures introduced in previous works, are natural generalizations of threshold secret sharing. Namely, they admit an ideal linear secret sharing schemes over every large enough finite field, they can be described by a small number of parameters, and they have useful properties for the applications of secret sharing. The use of integer polymatroids makes it possible to find many new such families … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
41
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(41 citation statements)
references
References 32 publications
0
41
0
Order By: Relevance
“…It is easy to see that these access structures greatly generalize the threshold cases. Several types of multipartite access structures have been in-depth studied in recent years such as compartmented access structures [44,48,47,9,18,16], weighted access structures [42,34,4,3], multilevel (hierarchical) access structures [44,9,6,18,17,16], partially hierarchical access structures [18,50], etc. And linear and efficient secret sharing schemes have been designed [42,9,44,48,47] for some of them.…”
Section: Extensionsmentioning
confidence: 99%
See 2 more Smart Citations
“…It is easy to see that these access structures greatly generalize the threshold cases. Several types of multipartite access structures have been in-depth studied in recent years such as compartmented access structures [44,48,47,9,18,16], weighted access structures [42,34,4,3], multilevel (hierarchical) access structures [44,9,6,18,17,16], partially hierarchical access structures [18,50], etc. And linear and efficient secret sharing schemes have been designed [42,9,44,48,47] for some of them.…”
Section: Extensionsmentioning
confidence: 99%
“…To showcase our basic scheme can be effectively extended to support multipartite access structures, we present an extension specifically for compartmented access structure with upper bounds [48,18]. For this type of access structures, there is a threshold for the whole participant set, and an upper bound for each separate group.…”
Section: Extensionsmentioning
confidence: 99%
See 1 more Smart Citation
“…They proved that every ideal hierarchical access structure is induced by a representable matroid. This connection of polymatroids and the associated access structures have been studied in [29]: Recently, by using the reduced discrete polymatroids, [30] obtained a sufficient condition for a multipartite access structure to be ideal and further give a new proof that all access structures related to bipartite and tripartite matroids coincide with the ideal ones. All these families of multipartite access structures described above are related to representable matroids, and hence, they are the ideal ones.…”
mentioning
confidence: 99%
“…In this chapter, we will give some new and useful families of access structures, which are mainly included in our paper [44]. This line of research was initiated by Kothari [60], who presented some ideas to construct ideal linear secret sharing schemes with hierarchical properties.…”
Section: Chapter 3 New Families Of Ideal Access Structures 31 Introdmentioning
confidence: 99%