Jump to content

Access structure

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Markulf (talk | contribs) at 10:22, 11 September 2006. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Access structures are used in the study of security system where multiple parties need to work together to obtain a resource. Groups of parties that are granted access are called qualified. In set theoretic terms they are referred to as qualified sets. In turn, the set of all such qualified sets is called the access structure of the system. Less formally it is a description of who needs to cooperate with whom in order to access the resource. In it's original use in cryptography, the resource was a secret [secret sharing|shared] among the participants. Only subgroups of participants contained in the access structure, are able to join their shares to recompute the secret. More generally, the resource can also be a task that a group of people can complete together, such as signing a signature, or decrypting an encrypted message.