Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,385,209 papers from all fields of science
Search
Sign In
Create Free Account
Access structure
Access structures are used in the study of security system where multiple parties need to work together to obtain a resource. Groups of parties that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Access control
Cryptography
Digital signature
Secret sharing
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
A CP-ABE scheme with system attributes revocation in cloud storage
Anping Xiong
,
Chunxiang Xu
,
Qi-Xian Gan
11th International Computer Conference on Wavelet…
2014
Corpus ID: 15558291
Attribute Based Encryption (CP-ABE) access control schemes has become a heated topic area in security since it is more suitable…
Expand
Highly Cited
2010
Highly Cited
2010
Unconditionally secure social secret sharing scheme
Mehrdad Nojoumian
,
Douglas R Stinson
,
Morgan Grainger
IET Information Security
2010
Corpus ID: 13895702
The authors introduce the notion of a ‘social secret sharing scheme’, in which shares are allocated based on a player's…
Expand
2010
2010
Secret sharing schemes from binary linear codes
Zhihui Li
,
Ting Xue
,
Hong Lai
Information Sciences
2010
Corpus ID: 44896162
2005
2005
Distributing the Encryption and Decryption of a Block Cipher
K. Martin
,
R. Safavi-Naini
,
Huaxiong Wang
,
P. Wild
Des. Codes Cryptogr.
2005
Corpus ID: 12868905
In threshold cryptography, the goal is to distribute the computation of basic cryptographic primitives across a number of nodes…
Expand
Highly Cited
2004
Highly Cited
2004
Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters
Wen-Guey Tzeng
IEEE Trans. Computers
2004
Corpus ID: 2374378
We propose efficient and secure (string) oblivious transfer (OT/sup 1//sub n/) schemes for any n/spl ges/2. We build our OT/sup 1…
Expand
2004
2004
Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters
Wen-Guey Tzeng
IEEE transactions on computers
2004
Corpus ID: 35629278
We propose efficient and secure (string) oblivious transfer (OT/sup 1//sub n/) schemes for any n/spl ges/2. We build our OT/sup 1…
Expand
2002
2002
Image indexing and retrieval using signature trees
M. Nascimento
,
Eleni Tousidou
,
Vishal Chitkara
,
Y. Manolopoulos
Data & Knowledge Engineering
2002
Corpus ID: 16841346
Highly Cited
1998
Highly Cited
1998
An on-line secret sharing scheme for multi-secrets
Ren-Junn Hwang
,
Chinchen Chang
Computer Communications
1998
Corpus ID: 12599477
Review
1993
Review
1993
A Cognitive Dimensional Analysis of Idea Sketches
C. C. Wood
,
Rank Xerox Cambridge
1993
Corpus ID: 14841255
In this paper Green's (1989) notion of "cognitive dimensions" is used to consider the properties of notations and media for…
Expand
Highly Cited
1989
Highly Cited
1989
An adaptive MLSE receiver for TDMA digital mobile radio
R. D'Avella
,
Luigi Moreno
,
M. Sant'Agostino
IEEE J. Sel. Areas Commun.
1989
Corpus ID: 12183392
The authors present a simulation study of an adaptive receiver, based on the concept of maximum-likelihood sequence estimation…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required