{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,16]],"date-time":"2024-07-16T09:56:05Z","timestamp":1721123765397},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T00:00:00Z","timestamp":1624406400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T00:00:00Z","timestamp":1624406400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100009934","name":"E\u00f6tv\u00f6s Lor\u00e1nd University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100009934","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2021,9]]},"abstract":"Abstract<\/jats:title>In the history of secret sharing schemes many constructions are based on geometric objects. In this paper we investigate generalizations of threshold schemes and related finite geometric structures. In particular, we analyse compartmented and hierarchical schemes, and deduce some more general results, especially bounds for special arcs and novel constructions for conjunctive 2-level and 3-level hierarchical schemes.<\/jats:p>","DOI":"10.1007\/s10623-021-00900-9","type":"journal-article","created":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T15:03:53Z","timestamp":1624460633000},"page":"2067-2078","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Generalized threshold secret sharing and finite geometry"],"prefix":"10.1007","volume":"89","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-3998-0515","authenticated-orcid":false,"given":"Peter","family":"Ligeti","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5323-0887","authenticated-orcid":false,"given":"Peter","family":"Sziklai","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2228-3414","authenticated-orcid":false,"given":"Marcella","family":"Tak\u00e1ts","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,23]]},"reference":[{"key":"900_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10623-012-9658-6","volume":"65","author":"S Ball","year":"2012","unstructured":"Ball S., De Beule J.: On sets of vectors of a finite vector space in which every subset of basis size is a basis II. Des. Codes Cryptogr. 65, 5\u201314 (2012).","journal-title":"Des. Codes Cryptogr."},{"key":"900_CR2","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BF01388411","volume":"3","author":"A Beutelspacher","year":"1993","unstructured":"Beutelspacher A., Wettl F.: On 2-level secret sharing. Des. Codes Cryptogr. 3, 127\u2013134 (1993).","journal-title":"Des. Codes Cryptogr."},{"key":"900_CR3","first-page":"313","volume":"48","author":"GR Blakley","year":"1979","unstructured":"Blakley G.R.: Safeguarding cryptographic keys. Proc. Natl. Compd. Conf. 48, 313\u2013317 (1979).","journal-title":"Proc. Natl. Compd. Conf."},{"key":"900_CR4","doi-asserted-by":"crossref","unstructured":"Blakley E.F., Kabatianskii G.A.: Linear algebra approach to secret sharing schemes. Error Control, Cryptology, and Speech Compression LNCS 829, 33\u201340 (1994).","DOI":"10.1007\/3-540-58265-7_5"},{"key":"900_CR5","first-page":"105","volume":"9","author":"EF Brickell","year":"1989","unstructured":"Brickell E.F.: Some ideal secret sharing schemes. J. Comb. Math. Comb. Comp. 9, 105\u2013113 (1989).","journal-title":"J. Comb. Math. Comb. Comp."},{"key":"900_CR6","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/BF02451112","volume":"5","author":"EF Brickell","year":"1992","unstructured":"Brickell E.F., Stinson D.R.: Some improved bounds on the information rate of perfect secret sharing schemes. J. Cryptol. 5, 153\u2013166 (1992).","journal-title":"J. Cryptol."},{"key":"900_CR7","doi-asserted-by":"crossref","unstructured":"Farr\u00e0s O., Padr\u00f2 C.: Ideal Hierarchical Secret Sharing Schemes, Theory of Cryptography, TCC 2010, LNCS 5978, 219\u2013236 (2010).","DOI":"10.1007\/978-3-642-11799-2_14"},{"key":"900_CR8","unstructured":"Fuji-Hara R., Miao Y.: Ideal Secret Sharing Schemes, Yet Another Combinatorial Characterization, Certain Access Structures, and Related Geometric Problems (2008). https:\/\/infoshako.sk.tsukuba.ac.jp\/~fujihara\/ftp\/sssOct.pdf."},{"key":"900_CR9","doi-asserted-by":"crossref","unstructured":"Ghodosi H., Pieprzyk J., Safavi-Naini R.: Secret Sharing in Multilevel and Compartmented Groups, ACISP 1998: Information Security and Privacy. LNCS 1438, 367\u2013378 (2006).","DOI":"10.1007\/BFb0053748"},{"key":"900_CR10","doi-asserted-by":"publisher","first-page":"3307","DOI":"10.1016\/j.disc.2006.06.009","volume":"306","author":"M Giulietti","year":"2006","unstructured":"Giulietti M., Montanucci E.: On hyperfocused arcs in $$PG(2, q)$$. Discret. Math. 306, 3307\u20133314 (2006).","journal-title":"Discret. Math."},{"key":"900_CR11","doi-asserted-by":"publisher","first-page":"3236","DOI":"10.1016\/j.disc.2009.11.040","volume":"310","author":"M Giulietti","year":"2010","unstructured":"Giulietti M., Vincenti R.: Three-level secret sharing schemes from the twisted cubic. Discret. Math. 310, 3236\u20133240 (2010).","journal-title":"Discret. Math."},{"key":"900_CR12","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/s00022-003-1633-y","volume":"79","author":"W-A Jackson","year":"2004","unstructured":"Jackson W.-A., Martin K.M., O\u2019Keefe C.M.: Geometrical contributions to secret sharing theory. J. Geom. 79, 102\u2013133 (2004).","journal-title":"J. Geom."},{"key":"900_CR13","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10623-011-9562-5","volume":"64","author":"G Korchm\u00e1ros","year":"2012","unstructured":"Korchm\u00e1ros G., Lanzone V., Sonnino A.: Projective $$k$$-arcs and 2-level secret-sharing schemes. Des. Codes Cryptogr. 64, 3\u201315 (2012).","journal-title":"Des. Codes Cryptogr."},{"key":"900_CR14","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A.: How to share a secret. Commun. ACM 22, 612\u2013613 (1979).","journal-title":"Commun. ACM"},{"key":"900_CR15","first-page":"875","volume":"25","author":"K Shima","year":"2017","unstructured":"Shima K., Doi H.: A hierarchical secret sharing scheme over finite fields of characteristic 2. J. Inf. Process. 25, 875\u2013883 (2017).","journal-title":"J. Inf. Process."},{"key":"900_CR16","first-page":"181","volume":"73","author":"G Simmons","year":"1989","unstructured":"Simmons G.: Sharply focused sets of lines on a conic in $$PG(2, q)$$. Congr. Numer. 73, 181\u2013204 (1989).","journal-title":"Congr. Numer."},{"key":"900_CR17","doi-asserted-by":"crossref","unstructured":"Tassa T.: Hierarchical Threshold Secret Sharing. Theory of Cryptography, TCC 2004. LNCS 2591, 473\u2013490 (2004)","DOI":"10.1007\/978-3-540-24638-1_26"},{"key":"900_CR18","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s00145-008-9027-9","volume":"22","author":"T Tassa","year":"2009","unstructured":"Tassa T., Dyn N.: Multipartite secret sharing by bivariate interpolation. J. Cryptol. 22, 227\u2013258 (2009).","journal-title":"J. Cryptol."},{"key":"900_CR19","doi-asserted-by":"crossref","unstructured":"Tentu A.N., Paul P., Vadlamudi C.V.: Conjunctive Hierarchical Secret Sharing Scheme Based on MDS Codes, IWOCA 2013: Combinatorial Algorithms. LNCS 8288, 463\u2013467 (2013).","DOI":"10.1007\/978-3-642-45278-9_44"},{"key":"900_CR20","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1023\/A:1008259214236","volume":"12","author":"M van Dijk","year":"1997","unstructured":"van Dijk M.: A linear construction of secret sharing schemes. Des. Codes Cryptogr. 12, 161\u2013201 (1997).","journal-title":"Des. Codes Cryptogr."},{"key":"900_CR21","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1007\/s12095-016-0205-6","volume":"9","author":"X Wang","year":"2017","unstructured":"Wang X., Xiang C., Fu F.-W.: Secret sharing schemes for compartmented access structures. Cryptogr. Commun. 9, 625\u2013635 (2017).","journal-title":"Cryptogr. Commun."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00900-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-021-00900-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00900-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T13:08:45Z","timestamp":1629378525000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-021-00900-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,23]]},"references-count":21,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["900"],"URL":"https:\/\/doi.org\/10.1007\/s10623-021-00900-9","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,23]]},"assertion":[{"value":"1 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 May 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}