Skip to search formSkip to main contentSkip to account menu

Access structure

Access structures are used in the study of security system where multiple parties need to work together to obtain a resource. Groups of parties that… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Attribute Based Encryption (CP-ABE) access control schemes has become a heated topic area in security since it is more suitable… 
Highly Cited
2010
Highly Cited
2010
The authors introduce the notion of a ‘social secret sharing scheme’, in which shares are allocated based on a player's… 
2005
2005
In threshold cryptography, the goal is to distribute the computation of basic cryptographic primitives across a number of nodes… 
Highly Cited
2004
Highly Cited
2004
We propose efficient and secure (string) oblivious transfer (OT/sup 1//sub n/) schemes for any n/spl ges/2. We build our OT/sup 1… 
2004
2004
We propose efficient and secure (string) oblivious transfer (OT/sup 1//sub n/) schemes for any n/spl ges/2. We build our OT/sup 1… 
Review
1993
Review
1993
In this paper Green's (1989) notion of "cognitive dimensions" is used to consider the properties of notations and media for… 
Highly Cited
1989
Highly Cited
1989
The authors present a simulation study of an adaptive receiver, based on the concept of maximum-likelihood sequence estimation…