Hierarchical threshold secret sharing

T Tassa - Journal of cryptology, 2007 - Springer
We consider the problem of threshold secret sharing in groups with hierarchical structure. In
such settings, the secret is shared among a group of participants that is partitioned into …

Ideal hierarchical secret sharing schemes

O Farras, C Padró - IEEE transactions on information theory, 2012 - ieeexplore.ieee.org
Hierarchical secret sharing is among the most natural generalizations of threshold secret
sharing, and it has attracted a lot of attention since the invention of secret sharing until …

Multipartite secret sharing by bivariate interpolation

T Tassa, N Dyn - Journal of Cryptology, 2009 - Springer
Given a set of participants that is partitioned into distinct compartments, a multipartite access
structure is an access structure that does not distinguish between participants belonging to …

Characterizing ideal weighted threshold secret sharing

A Beimel, T Tassa, E Weinreb - Theory of Cryptography: Second Theory of …, 2005 - Springer
Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret
sharing. In such settings, there is a set of users where each user is assigned a positive …

Hierarchical threshold secret sharing

T Tassa - Theory of Cryptography Conference, 2004 - Springer
We consider the problem of threshold secret sharing in groups with hierarchical structure. In
such settings, the secret is shared among a group of participants that is partitioned into …

A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations

J Yuan, J Yang, C Wang, X Jia, FW Fu, G Xu - Information Sciences, 2022 - Elsevier
Hierarchical secret sharing is an important key management technique since it is specially
customized for hierarchical organizations with different departments allocated with different …

Ideal multipartite secret sharing schemes

O Farràs, J Martí-Farré, C Padró - Journal of cryptology, 2012 - Springer
Multipartite secret sharing schemes are those having a multipartite access structure, in
which the set of participants is divided into several parts and all participants in the same part …

Ideal multipartite secret sharing schemes

O Farras, J Martí-Farré, C Padró - … on the Theory and Applications of …, 2007 - Springer
Multipartite secret sharing schemes are those having a multipartite access structure, in
which the set of participants is divided into several parts and all participants in the same part …

Characterizing ideal weighted threshold secret sharing

A Beimel, T Tassa, E Weinreb - SIAM Journal on Discrete Mathematics, 2008 - SIAM
Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret
sharing. In such settings, there is a set of users where each user is assigned a positive …

On codes, matroids, and secure multiparty computation from linear secret-sharing schemes

R Cramer, V Daza, I Gracia, JJ Urroz… - IEEE Transactions …, 2008 - ieeexplore.ieee.org
Error-correcting codes and matroids have been widely used in the study of ordinary secret
sharing schemes. In this paper, the connections between codes, matroids, and a special …