User profiles for Tamir Tassa
![]() | Tamir TassaProfessor of Computer Science, The Open University of Israel Verified email at openu.ac.il Cited by 4528 |
Hierarchical threshold secret sharing
T Tassa - Journal of cryptology, 2007 - Springer
We consider the problem of threshold secret sharing in groups with hierarchical structure. In
such settings, the secret is shared among a group of participants that is partitioned into levels…
such settings, the secret is shared among a group of participants that is partitioned into levels…
Multipartite secret sharing by bivariate interpolation
T Tassa, N Dyn - Journal of Cryptology, 2009 - Springer
Given a set of participants that is partitioned into distinct compartments, a multipartite access
structure is an access structure that does not distinguish between participants belonging to …
structure is an access structure that does not distinguish between participants belonging to …
[PDF][PDF] Improved bounds on Bell numbers and on moments of sums of random variables
We provide bounds for moments of sums of sequences of independent random variables.
Concentrating on uniformly bounded non-negative random variables, we are able to improve …
Concentrating on uniformly bounded non-negative random variables, we are able to improve …
Hierarchical threshold secret sharing
T Tassa - Theory of Cryptography Conference, 2004 - Springer
We consider the problem of threshold secret sharing in groups with hierarchical structure. In
such settings, the secret is shared among a group of participants that is partitioned into levels…
such settings, the secret is shared among a group of participants that is partitioned into levels…
Generating summaries and visualization for large collections of geo-referenced photographs
We describe a framework for automatically selecting a summary set of photos from a large
collection of geo-referenced photographs. Such large collections are inherently difficult to …
collection of geo-referenced photographs. Such large collections are inherently difficult to …
On syntactic anonymity and differential privacy
Recently, there has been a growing debate over approaches for handling and analyzing
private data. Research has identified issues with syntactic anonymity models. Differential …
private data. Research has identified issues with syntactic anonymity models. Differential …
Generalized oblivious transfer by secret sharing
T Tassa - Designs, Codes and Cryptography, 2011 - Springer
The notion of Generalized Oblivious Transfer (GOT) was introduced by Ishai and Kushilevitz
(Proceeding of ISTCS97, IEEE Computer Society, pp 174–184, 1997). In a GOT protocol, …
(Proceeding of ISTCS97, IEEE Computer Society, pp 174–184, 1997). In a GOT protocol, …
Anonymization of centralized and distributed social networks by sequential clustering
T Tassa, DJ Cohen - IEEE Transactions on Knowledge and …, 2011 - ieeexplore.ieee.org
We study the problem of privacy-preservation in social networks. We consider the distributed
setting in which the network data is split between several data holders. The goal is to arrive …
setting in which the network data is split between several data holders. The goal is to arrive …
Secure mining of association rules in horizontally distributed databases
T Tassa - IEEE Transactions on Knowledge and Data …, 2013 - ieeexplore.ieee.org
We propose a protocol for secure mining of association rules in horizontally distributed
databases. The current leading protocol is that of Kantarcioglu and Clifton . Our protocol, like …
databases. The current leading protocol is that of Kantarcioglu and Clifton . Our protocol, like …
Dynamic traitor tracing
Traitor tracing schemes were introduced so as to combat the typical piracy scenario whereby
pirate decoders (or access control smart-cards) are manufactured and sold by pirates to …
pirate decoders (or access control smart-cards) are manufactured and sold by pirates to …