Access structures are used in the study of security systems where multiple parties need to work together to obtain a resource. Groups of parties that are granted access are called qualified. In
set theoretic terms they are referred to as qualified sets; in turn, the set of all such qualified sets is called the access structure of the system. Less formally it is a description of who needs to cooperate with whom in order to access the resource. In its original use in
cryptography
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adve ...
, the resource was a secret
shared among the participants.
Only subgroups of participants contained in the access structure are able to join their shares to recompute the secret. More generally, the resource can also be a task that a group of people can complete together, such as creating a
digital signature
A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature, where the prerequisites are satisfied, gives a recipient very high confidence that the message was created b ...
, or decrypting an encrypted message.
It is reasonable to assume that access structures are
monotone in the sense that, if a subset S is in the access structure, all sets that contain S as a subset should also form part of the access structure.
See also
*
Access control
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of ''accessing'' may mean consuming ...
*
Secret sharing
Secret sharing (also called secret splitting) refers to methods for distributing a secret among a group, in such a way that no individual holds any intelligible information about the secret, but when a sufficient number of individuals combine th ...
*
Threshold cryptosystem
References
Access control
{{crypto-stub