In secret sharing, different access structures have different difficulty degrees for acceding to the secret. We give a numerical measure of how easy or how difficult is to recover the secret, depending only on the structure itself and not on the particular scheme used for realizing it. We derive some consequences.
Mots-clés : cryptography, secret sharing schemes, access structures
@article{ITA_2006__40_4_559_0, author = {Carreras, Francesc and Maga\~na, Antonio and Munuera, Carlo}, title = {The accessibility of an access structure}, journal = {RAIRO - Theoretical Informatics and Applications - Informatique Th\'eorique et Applications}, pages = {559--567}, publisher = {EDP-Sciences}, volume = {40}, number = {4}, year = {2006}, doi = {10.1051/ita:2006040}, mrnumber = {2277049}, zbl = {1117.94014}, language = {en}, url = {http://www.numdam.org/articles/10.1051/ita:2006040/} }
TY - JOUR AU - Carreras, Francesc AU - Magaña, Antonio AU - Munuera, Carlo TI - The accessibility of an access structure JO - RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications PY - 2006 SP - 559 EP - 567 VL - 40 IS - 4 PB - EDP-Sciences UR - http://www.numdam.org/articles/10.1051/ita:2006040/ DO - 10.1051/ita:2006040 LA - en ID - ITA_2006__40_4_559_0 ER -
%0 Journal Article %A Carreras, Francesc %A Magaña, Antonio %A Munuera, Carlo %T The accessibility of an access structure %J RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications %D 2006 %P 559-567 %V 40 %N 4 %I EDP-Sciences %U http://www.numdam.org/articles/10.1051/ita:2006040/ %R 10.1051/ita:2006040 %G en %F ITA_2006__40_4_559_0
Carreras, Francesc; Magaña, Antonio; Munuera, Carlo. The accessibility of an access structure. RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications, Tome 40 (2006) no. 4, pp. 559-567. doi : 10.1051/ita:2006040. http://www.numdam.org/articles/10.1051/ita:2006040/
[1] Extended Capabilities for visual cryptography. Theoretical Comput. Sci. 250 (2001) 143-162. | Zbl
, , and ,[2] Safeguarding cryptographic keys. AFIPS Conference Proceedings 48 (1979) 313-317.
,[3] How to share a secret. Commun. ACM, 22 (1979) 612-613. | Zbl
,[4] Cryptography: Theory and Practice. CRC Press (1995). | MR | Zbl
,Cité par Sources :