## Cryptology ePrint Archive: Report 2008/502

**Extended Access Structures and Their Cryptographic Applications**

*Vanesa Daza and Javier Herranz and Paz Morillo and Carla Rafols*

**Abstract: **In secret sharing schemes a secret is distributed among a set of users $\mathcal{P}$ in such a way that only some sets, the authorized sets, can recover it. The family $\Gamma$ of authorized sets is called access structure. Given such a monotone family $\Gamma \subset 2^\P$, we introduce the concept of \emph{extended access structures}, defined over a larger set $\P' = \P \cup \tilde{\P}$, satisfying these two properties: (1) the set $\P$ is a minimal subset of $\Gamma'$, i.e. $\P - \{R_i\} \notin \Gamma'$ for every $R_i \in \P$, (2) a subset $A \subset \P$ is in $\Gamma$ if and only if the subset $A \cup \tilde{\P}$ is in $\Gamma'$.

As our first contribution, we give an explicit construction of an extended access structure $\Gamma'$ starting from a vector space access structure $\Gamma$, and we prove that $\Gamma'$ is also vector space. Our second contribution is to show that the concept of extended access structure can be used to design encryption schemes which involve access structures that are chosen ad-hoc at the time of encryption. Specifically, we design and analyze a dynamic distributed encryption scheme and a ciphertext-policy attribute-based encryption scheme. In some cases, the new schemes enjoy better properties than the existing ones.

**Category / Keywords: **cryptographic protocols / secret sharing, dynamic distributed encryption, attribute-based encryption

**Publication Info: **Applicable Algebra in Engineering, Communication and Computing, Volume 21, Issue 4, pp. 257-284, 2010

**Date: **received 28 Nov 2008, last revised 24 Nov 2010

**Contact author: **jherranz at ma4 upc edu

**Available format(s): **PDF | BibTeX Citation

**Version: **20101124:113904 (All versions of this report)

**Discussion forum: **Show discussion | Start new discussion

[ Cryptology ePrint archive ]