Global Information Lookup Global Information

Access structure information


Access structures are used in the study of security systems where multiple parties need to work together to obtain a resource.[1] Groups of parties that are granted access are called qualified. In set theoretic terms they are referred to as qualified sets; in turn, the set of all such qualified sets is called the access structure of the system. Less formally it is a description of who needs to cooperate with whom in order to access the resource. In its original use in cryptography, the resource was a secret shared among the participants.[2] Only subgroups of participants contained in the access structure are able to join their shares to recompute the secret. More generally, the resource can also be a task that a group of people can complete together, such as creating a digital signature, or decrypting an encrypted message.

It is reasonable to assume that access structures are monotone in the sense that, if a subset S is in the access structure, all sets that contain S as a subset should also form part of the access structure.

  1. ^ Shamir, Adi (1 November 1979). "How to share a secret". Communications of the ACM. 22 (11): 612–613. doi:10.1145/359168.359176. ISSN 0001-0782.
  2. ^
      • Daza, Vanesa; Herranz, Javier; Morillo, Paz; Ràfols, Carla (28 November 2008). Extended Access Structures and Their Cryptographic Applications (Report).
      • Daza, Vanesa; Herranz, Javier; Morillo, Paz; Ràfols, Carla (2010). "Extensions of access structures and their cryptographic applications". Applicable Algebra in Engineering, Communication and Computing. 21 (4): 257–284. doi:10.1007/s00200-010-0125-1.

and 23 Related for: Access structure information

Request time (Page generated in 0.8795 seconds.)

Access structure

Last Update:

Access structures are used in the study of security systems where multiple parties need to work together to obtain a resource. Groups of parties that...

Word Count : 268

Structure

Last Update:

A structure is an arrangement and organization of interrelated elements in a material object or system, or the object or system so organized. Material...

Word Count : 2204

Data structure

Last Update:

data structure is a data organization, and storage format that is usually chosen for efficient access to data. More precisely, a data structure is a collection...

Word Count : 1825

Access

Last Update:

mobile devices Access network, the process of signing onto a network Access Virus, a German musical device Experimental Assembly of Structures in EVA and...

Word Count : 324

Data structure alignment

Last Update:

Data structure alignment is the way data is arranged and accessed in computer memory. It consists of three separate but related issues: data alignment...

Word Count : 3423

Persistent data structure

Last Update:

versions can be accessed but only the newest version can be modified. The data structure is fully persistent if every version can be both accessed and modified...

Word Count : 6207

Garbage can model

Last Update:

problems, and solutions are allowed access to the choice arena. The loosest access structure, unrestricted/democratic access allows all problems, solutions...

Word Count : 4834

Open access

Last Update:

Open access (OA) is a set of principles and a range of practices through which research outputs are distributed online, free of access charges or other...

Word Count : 17690

Service structure

Last Update:

access tower system, the Fixed Service Structure (FSS) and the Rotating Service Structure (RSS). The FSS permitted access to the Shuttle via a retractable arm...

Word Count : 574

Microsoft Access

Last Update:

Microsoft Access is a database management system (DBMS) from Microsoft that combines the relational Access Database Engine (ACE) with a graphical user...

Word Count : 6622

Organizational structure

Last Update:

An organizational structure defines how activities such as task allocation, coordination, and supervision are directed toward the achievement of organizational...

Word Count : 6304

Access Point Name

Last Update:

An Access Point Name (APN) is the name of a gateway between a mobile network (GSM, GPRS, 3G, 4G and 5G) and another computer network, frequently the public...

Word Count : 668

Internet access

Last Update:

Internet access is a facility or service that provides connectivity for a computer, a computer network, or other network device to the Internet, and for...

Word Count : 14562

Access control

Last Update:

and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the...

Word Count : 6064

Random access

Last Update:

Random access (more precisely and more generally called direct access) is the ability to access an arbitrary element of a sequence in equal time or any...

Word Count : 544

List of tallest buildings and structures

Last Update:

coordinates) GPX (secondary coordinates) The world's tallest human-made structure is the 828-metre-tall (2,717 ft) Burj Khalifa in Dubai, United Arab Emirates...

Word Count : 4073

Cloud computing security

Last Update:

problem. Since decryption keys in ABE only contain information regarding access structure or the attributes of the user it is hard to verify the user's actual...

Word Count : 6675

Market structure

Last Update:

Market structure, in economics, depicts how firms are differentiated and categorised based on the types of goods they sell (homogeneous/heterogeneous)...

Word Count : 2671

Friend class

Last Update:

is for a part of a data structure, represented by a class, to provide access to the main class representing that data structure. The friend class mechanism...

Word Count : 768

Directory structure

Last Update:

In computing, a directory structure is the way an operating system arranges files that are accessible to the user. Files are typically displayed in a...

Word Count : 339

Soil structure

Last Update:

low concentration) to gain access to the soil. A wide range of practices are undertaken to preserve and improve soil structure. For example, the NSW Department...

Word Count : 1742

Tailored Access Operations

Last Update:

The Office of Tailored Access Operations (TAO), now Computer Network Operations, and structured as S32, is a cyber-warfare intelligence-gathering unit...

Word Count : 2472

Sequential access

Last Update:

on the definition of sequentiality. In data structures, a data structure is said to have sequential access if one can only visit the values it contains...

Word Count : 422

PDF Search Engine © AllGlobal.net