User profiles for Tamir Tassa

Tamir Tassa

Professor of Computer Science, The Open University of Israel
Verified email at openu.ac.il
Cited by 4528

Hierarchical threshold secret sharing

T Tassa - Journal of cryptology, 2007 - Springer
We consider the problem of threshold secret sharing in groups with hierarchical structure. In
such settings, the secret is shared among a group of participants that is partitioned into levels…

Multipartite secret sharing by bivariate interpolation

T Tassa, N Dyn - Journal of Cryptology, 2009 - Springer
Given a set of participants that is partitioned into distinct compartments, a multipartite access
structure is an access structure that does not distinguish between participants belonging to …

[PDF][PDF] Improved bounds on Bell numbers and on moments of sums of random variables

D Berend, T Tassa - Probability and Mathematical Statistics, 2010 - openu.ac.il
We provide bounds for moments of sums of sequences of independent random variables.
Concentrating on uniformly bounded non-negative random variables, we are able to improve …

Hierarchical threshold secret sharing

T Tassa - Theory of Cryptography Conference, 2004 - Springer
We consider the problem of threshold secret sharing in groups with hierarchical structure. In
such settings, the secret is shared among a group of participants that is partitioned into levels…

Generating summaries and visualization for large collections of geo-referenced photographs

A Jaffe, M Naaman, T Tassa, M Davis - Proceedings of the 8th ACM …, 2006 - dl.acm.org
We describe a framework for automatically selecting a summary set of photos from a large
collection of geo-referenced photographs. Such large collections are inherently difficult to …

On syntactic anonymity and differential privacy

C Clifton, T Tassa - 2013 IEEE 29th International Conference on …, 2013 - ieeexplore.ieee.org
Recently, there has been a growing debate over approaches for handling and analyzing
private data. Research has identified issues with syntactic anonymity models. Differential …

Generalized oblivious transfer by secret sharing

T Tassa - Designs, Codes and Cryptography, 2011 - Springer
The notion of Generalized Oblivious Transfer (GOT) was introduced by Ishai and Kushilevitz
(Proceeding of ISTCS97, IEEE Computer Society, pp 174–184, 1997). In a GOT protocol, …

Anonymization of centralized and distributed social networks by sequential clustering

T Tassa, DJ Cohen - IEEE Transactions on Knowledge and …, 2011 - ieeexplore.ieee.org
We study the problem of privacy-preservation in social networks. We consider the distributed
setting in which the network data is split between several data holders. The goal is to arrive …

Secure mining of association rules in horizontally distributed databases

T Tassa - IEEE Transactions on Knowledge and Data …, 2013 - ieeexplore.ieee.org
We propose a protocol for secure mining of association rules in horizontally distributed
databases. The current leading protocol is that of Kantarcioglu and Clifton . Our protocol, like …

Dynamic traitor tracing

A Fiat, T Tassa - Annual International Cryptology Conference, 1999 - Springer
Traitor tracing schemes were introduced so as to combat the typical piracy scenario whereby
pirate decoders (or access control smart-cards) are manufactured and sold by pirates to …