TY - GEN
T1 - Multipartite secret sharing by bivariate interpolation
AU - Tassa, Tamir
AU - Dyn, Nira
N1 - Copyright:
Copyright 2015 Elsevier B.V., All rights reserved.
PY - 2006
Y1 - 2006
N2 - Given a set of participants that is partitioned into distinct compartments, a multipartite access structure is an access structure that does not distinguish between participants that belong to the same compartment. We examine here three types of such access structures - compartmented access structures with lower bounds, compartmented access structures with upper bounds, and hierarchical threshold access structures. We realize those access structures by ideal perfect secret sharing schemes that are based on bivariate Lagrange interpolation. The main novelty of this paper is the introduction of bivariate interpolation and its potential power in designing schemes for multipartite settings, as different compartments may be associated with different lines in the plane. In particular, we show that the introduction of a second dimension may create the same hierarchical effect as polynomial derivatives and Birkhoff interpolation were shown to do in [13].
AB - Given a set of participants that is partitioned into distinct compartments, a multipartite access structure is an access structure that does not distinguish between participants that belong to the same compartment. We examine here three types of such access structures - compartmented access structures with lower bounds, compartmented access structures with upper bounds, and hierarchical threshold access structures. We realize those access structures by ideal perfect secret sharing schemes that are based on bivariate Lagrange interpolation. The main novelty of this paper is the introduction of bivariate interpolation and its potential power in designing schemes for multipartite settings, as different compartments may be associated with different lines in the plane. In particular, we show that the introduction of a second dimension may create the same hierarchical effect as polynomial derivatives and Birkhoff interpolation were shown to do in [13].
KW - Bivariate interpolation
KW - Compart-mented access structures
KW - Hierarchical threshold access structures
KW - Monotone span programs
KW - Multipartite access structures
KW - Secret sharing
UR - http://www.scopus.com/inward/record.url?scp=33746381973&partnerID=8YFLogxK
U2 - 10.1007/11787006_25
DO - 10.1007/11787006_25
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:33746381973
SN - 3540359079
SN - 9783540359074
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 288
EP - 299
BT - Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings
PB - Springer Verlag
T2 - 33rd International Colloquium on Automata, Languages and Programming, ICALP 2006
Y2 - 10 July 2006 through 14 July 2006
ER -