On Hierarchical Threshold Access Structures

نویسندگان

  • Kerem Kaşkaloğlu
  • Ferruh Özbudak
چکیده

One of the recent generalizations of (t, n) secret sharing for hierarchical threshold access structures is given by Tassa, where he answers the natural question of sharing a secret among a set of participants, say military officers, so that the secret can be constructed by a group of participants, some of whom are hierarchically superior to others. Both recent schemes proposed by Tassa for addressing this problem require some significant amount of theoretical background. We give a conceptually simpler alternative for the understanding of the realization of hierarchical threshold access structures and we consider perfectness of our scheme with the help of computer experiments. Our simple scheme employs a slightly different approach than previous works, as it involves a certain distribution of polynomials, where members of higher compartments are given a summation of evaluations of higher number of polynomials, resulting in a hierarchical effect. We further consider some alternative hierarchical access structures having potential to be applied in military. The access structures that we consider are realized herein with a simple employment of the well known building blocks such as Lagrange interpolation and access structure product and can be realized with an information rate at worst 1/m.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Characterizing Ideal Weighted Threshold Secret Sharing

Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret sharing. In such settings, there is a set of users where each user is assigned a positive weight. A dealer wishes to distribute a secret among those users so that a subset of users may reconstruct the secret if and only if the sum of weights of its users exceeds a certain threshold. A secret sharing scheme ...

متن کامل

On Multiplicative Secret Sharing Schemes Realizing Graph Access Structures

In this paper we consider graph access structures and we show that such an access structure can be realized by a (strongly) multiplicative monotone span program if and only if the privacy structure contains at least three (resp. four) maximal sets. Thus, we obtain a new family of access structures with an explicit construction that is both ideal and strongly multiplicative. Until now only three...

متن کامل

Distributed key generation protocol with hierarchical threshold access structure

A distributed key generation (DKG) protocol is a central component in distributed cryptosystems. It allows a group of participants to jointly generate a pair of keys (private key and public key) without assuming any trusted participant. The public key is output in clear but only authorised subgroups of participants are able to reconstruct or use the private key. Existing literature on DKG proto...

متن کامل

DKG protocol in hierarchical threshold access structure

A distributed key generation (DKG) protocol is a central segment in distributed cryptosystems. It permits a gathering of members to mutually produce a pair of keys (private key and public key) without assuming any trusted member. The public key is output in clear but only authorised subgroups of members are able to reconstruct or utilize the private key. Existing study on DKG protocols assumes ...

متن کامل

Ideal Secret Sharing Schemes for Useful Multipartite Access Structures

This paper is a survey of the main results and open problems in a line of work that was initiated shortly after secret sharing was introduced. Namely, the construction of ideal linear secret sharing schemes for access structures that are natural generalizations of the threshold ones and have interesting properties for the applications. Some of them have hierarchical properties, while other ones...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013