Secret sharing with access structures in a hierarchy | IEEE Conference Publication | IEEE Xplore