The accessibility of an access structure
RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications, Tome 40 (2006) no. 4, pp. 559-567.

In secret sharing, different access structures have different difficulty degrees for acceding to the secret. We give a numerical measure of how easy or how difficult is to recover the secret, depending only on the structure itself and not on the particular scheme used for realizing it. We derive some consequences.

DOI : https://doi.org/10.1051/ita:2006040
Classification : 94A62,  94A60
Mots clés : cryptography, secret sharing schemes, access structures
@article{ITA_2006__40_4_559_0,
     author = {Carreras, Francesc and Maga\~na, Antonio and Munuera, Carlo},
     title = {The accessibility of an access structure},
     journal = {RAIRO - Theoretical Informatics and Applications - Informatique Th\'eorique et Applications},
     pages = {559--567},
     publisher = {EDP-Sciences},
     volume = {40},
     number = {4},
     year = {2006},
     doi = {10.1051/ita:2006040},
     zbl = {1117.94014},
     mrnumber = {2277049},
     language = {en},
     url = {http://www.numdam.org/articles/10.1051/ita:2006040/}
}
TY  - JOUR
AU  - Carreras, Francesc
AU  - Magaña, Antonio
AU  - Munuera, Carlo
TI  - The accessibility of an access structure
JO  - RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications
PY  - 2006
DA  - 2006///
SP  - 559
EP  - 567
VL  - 40
IS  - 4
PB  - EDP-Sciences
UR  - http://www.numdam.org/articles/10.1051/ita:2006040/
UR  - https://zbmath.org/?q=an%3A1117.94014
UR  - https://www.ams.org/mathscinet-getitem?mr=2277049
UR  - https://doi.org/10.1051/ita:2006040
DO  - 10.1051/ita:2006040
LA  - en
ID  - ITA_2006__40_4_559_0
ER  - 
Carreras, Francesc; Magaña, Antonio; Munuera, Carlo. The accessibility of an access structure. RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications, Tome 40 (2006) no. 4, pp. 559-567. doi : 10.1051/ita:2006040. http://www.numdam.org/articles/10.1051/ita:2006040/

[1] G. Ateniese, C. Blundo, A. De Santis and D. Stinson, Extended Capabilities for visual cryptography. Theoretical Comput. Sci. 250 (2001) 143-162. | Zbl 0952.68056

[2] G.R. Blakley, Safeguarding cryptographic keys. AFIPS Conference Proceedings 48 (1979) 313-317.

[3] A. Shamir, How to share a secret. Commun. ACM, 22 (1979) 612-613. | Zbl 0414.94021

[4] D.R. Stinson, Cryptography: Theory and Practice. CRC Press (1995). | MR 1327060 | Zbl 0855.94001

Cité par Sources :