Skip to main navigation
Skip to search
Skip to main content
Open University of Israel Home
Pure Tutorial for OUI staff
English
עברית
العربية
Home
Researchers
Research units
Research outputs
Prizes
Activities
Search by expertise, name or affiliation
Hierarchical Threshold Secret Sharing
Tamir Tassa
Computer Science discipline
Research output
:
Chapter in Book/Report/Conference proceeding
›
Chapter
›
peer-review
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Hierarchical Threshold Secret Sharing'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Access Structure
33%
Bank Transfers
33%
Birkhoff Interpolation
100%
Confidence Level
33%
Department Manager
33%
Finite Fields
66%
Free Coefficients
33%
Hierarchical Group
33%
Hierarchical Structure
66%
Hierarchical Threshold
100%
Interpolation Problem
33%
Perfect Secret Sharing Scheme
33%
Secret Sharing
33%
Secret Sharing Scheme
33%
Shamir's Scheme
33%
Substantial Part
33%
Threshold Secret Sharing
100%
Well-posed
33%
Computer Science
Access Structure
33%
Interpolation Problem
33%
Secret Sharing
100%
secret sharing scheme
66%
Mathematics
Finite Field
66%
Interpolation Problem
33%
Polynomial
100%