Ideal hierarchical secret sharing schemes

O Farras, C Padró - IEEE transactions on information theory, 2012 - ieeexplore.ieee.org
… The qualified subsets form the access structure of the scheme, which is a monotone …
secure perfect secret sharing schemes are considered in this paper. Secret sharing was …

Hierarchical threshold secret sharing

T Tassa - Journal of cryptology, 2007 - Springer
… a perfect secret sharing scheme for this problem that, unlike most secret sharing schemes
that are suitable for hierarchical … To this end, we define hierarchical secret sharing as follows: …

Fair hierarchical secret sharing scheme based on smart contract

E Zhang, M Li, SM Yiu, J Du, JZ Zhu, GG Jin - Information Sciences, 2021 - Elsevier
hierarchical threshold secret sharing (HTSS) scheme using blockchain. In the … of hierarchical
secret sharing and blockchain. We design a smart contract for secret sharing that is suitable

Hierarchical threshold secret sharing

T Tassa - Theory of Cryptography Conference, 2004 - Springer
… a perfect secret sharing scheme for this problem that, unlike most secret sharing schemes
that are suitable for hierarchical … To this end, we define hierarchical secret sharing as follows: …

An ideal hierarchical secret sharing scheme

G Meriem, B Sadek - arXiv preprint arXiv:2003.12651, 2020 - arxiv.org
… of a secret sharing scheme which is based on the hierarchicalscheme is ideal by showing
that the information rate equals 1. In order to show the efficiency of the proposed scheme, we …

Ideal and perfect hierarchical secret sharing schemes based on mds codes

AN Tentu, P Paul, VC Venkaiah - Cryptology ePrint Archive, 2013 - eprint.iacr.org
ideal secret sharing scheme for conjunctive access structure. In fact, we have another scheme
which is both ideal and perfect … However, we present only the former scheme because of …

Secret-sharing schemes: A survey

A Beimel - International conference on coding and cryptology, 2011 - Springer
… between secretsharing schemes and monotone formulae and monotone span programs.
We … In Section 5, we discuss lower bounds for secret-sharing schemes and present the best

A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations

J Yuan, J Yang, C Wang, X Jia, FW Fu, G Xu - Information Sciences, 2022 - Elsevier
… The secret sharing scheme is perfect if the participants in any unqualified subsets cannot …
Notice that our scheme is the first type. We propose a hierarchical secret sharing scheme

Efficient explicit constructions of multipartite secret sharing schemes

Q Chen, C Tang, Z Lin - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
… of ideal multipartite secret sharing schemes. Most ideal multipartite secret sharing schemes
… results with the efficient methods to construct hierarchical secret sharing schemes from [9], […

Characterizing ideal weighted threshold secret sharing

A Beimel, T Tassa, E Weinreb - Theory of Cryptography: Second Theory of …, 2005 - Springer
… ear ideal secret sharing scheme. The proof of our characterization relies heavily on the strong
connection between ideal secret sharing schemes … is ideal if and only if it is a hierarchical