1996
DOI: 10.1007/bf00129769
|View full text |Cite
|
Sign up to set email alerts
|

Perfect secret sharing schemes on five participants

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
94
0

Year Published

2006
2006
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 60 publications
(95 citation statements)
references
References 13 publications
1
94
0
Order By: Relevance
“…One of the most remarkable consequences of Theorem 4.4 is related to a repeated phenomenon was observed in several families of access structures as, for instance, the ones defined by graphs [15], the ones on at most five participants [43,26], the bipartite access structures [37], the structures with at most four minimal qualified subsets [31], or the ones with intersection number equal to one [32]. Namely, in all these families, the optimal complexity of every nonideal access structure is at least 3/2.…”
Section: Introductionmentioning
confidence: 94%
See 4 more Smart Citations
“…One of the most remarkable consequences of Theorem 4.4 is related to a repeated phenomenon was observed in several families of access structures as, for instance, the ones defined by graphs [15], the ones on at most five participants [43,26], the bipartite access structures [37], the structures with at most four minimal qualified subsets [31], or the ones with intersection number equal to one [32]. Namely, in all these families, the optimal complexity of every nonideal access structure is at least 3/2.…”
Section: Introductionmentioning
confidence: 94%
“…Obviously, λ(Γ) ≥ σ(Γ) and, of course, every construction of a linear secret sharing scheme for Γ provides an upper bound for λ(Γ), and hence for σ(Γ). Efficient constructions can be obtained by using the existing methods to combine some given linear secret sharing schemes into a new one [14,18,26,38,44,45]. In order to develop a fully formal exposition, specially when dealing with minors in Section 2.4, we consider that σ(Γ) = λ(Γ) = 0 if Γ is a trivial access structure.…”
Section: H(ementioning
confidence: 99%
See 3 more Smart Citations