Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification (Q2232597): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3108103136 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a secret / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5581642 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rational secret sharing and multiparty computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security of Ramp Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Share a Secret, Infinitely / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4343446 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3792623 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Evolving ramp secret sharing with a small gap / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security in Locally Repairable Storage / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the local leakage resilience of linear secret sharing schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-malleable secret sharing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum secret sharing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Verifiable threshold quantum secret sharing with sequential communication / rank
 
Normal rank
Property / cites work
 
Property / cites work: A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Implementation of quantum secret sharing and quantum binary voting protocol in the IBM quantum computer / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient quantum secret sharing without a trusted player / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035739 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a function securely / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249323 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374918 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Multiparty Computation and Secret Sharing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Policy Attribute-Based Encryption for General Boolean Circuits from Secret Sharing and Multi-linear Maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generalized oblivious transfer by secret sharing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Alternative Protocols for Generalized Oblivious Transfer / rank
 
Normal rank
Property / cites work
 
Property / cites work: Perfectly secure message transmission / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure message transmission in asynchronous networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures / rank
 
Normal rank
Property / cites work
 
Property / cites work: General Perfectly Secure Message Transmission Using Linear Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cutting-edge cryptography through the lens of secret sharing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Compute under $${\mathcal {\varvec{AC}}}^\mathbf{0}$$ Leakage without Secure Hardware / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941853 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Financial Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Multiparty Computation Goes Live / rank
 
Normal rank
Property / cites work
 
Property / cites work: Access structure hiding secret sharing from novel set systems and vector families / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: An almost-surely terminating polynomial protocol for asynchronous byzantine agreement with optimal resilience / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast asynchronous Byzantine agreement with optimal resilience / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Expected Constant-Round Protocols for Byzantine Agreement / rank
 
Normal rank
Property / cites work
 
Property / cites work: Asynchronous Byzantine agreement with optimal resilience / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a secret with cheaters / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035712 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simplified VSS and fast-track multiparty computations with applications to threshold cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constant-Size Commitments to Polynomials and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Asynchronous Computational VSS with Reduced Communication Complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Publicly Verifiable Secret Sharing / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Byzantine Generals Problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Providing anonymity in unconditionally secure secret sharing schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Strongly ideal secret sharing schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Anonymous secret sharing schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the bound for anonymous secret sharing schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructions for anonymous secret sharing schemes using combinatorial designs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Steiner Triple Systems without Parallel Classes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Some new 2-resolvable Steiner quadruple systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Transitive Steiner and Kirkman Triple Systems of Order 27 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Almost all Steiner triple systems have perfect matchings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Asymptotic behavior of the chromatic index for hypergraphs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5661892 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Almost all Steiner triple systems are almost resolvable / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proper S(t, K,v)'s for t ≥ 3,v ≤ 16, |K| > 1 and Their Extensions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Extending AG(4, 2) to S(4, {5, 6}, 17) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4529517 / rank
 
Normal rank
Property / cites work
 
Property / cites work: There exists no Steiner system \(S(4,5,17)\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4256358 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4474199 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4343413 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Almost Optimum t-Cheater Identifiable Secret Sharing Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identifying Cheaters without an Honest Majority / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4204100 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking the circuit-size barrier in secret sharing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards breaking the exponential barrier for general secret sharing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Better secret sharing via robust conditional disclosure of secrets / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secret-sharing schemes for general and uniform access structures / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the size of shares for secret sharing schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4370857 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The size of a share must be large / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the information rate of perfect secret sharing schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secret-Sharing Schemes: A Survey / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341739 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secret-Sharing for NP / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probabilistic encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Generate Cryptographically Strong Sequences of Pseudorandom Bits / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Pseudorandom Generator from any One-way Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pseudorandom bits for constant depth circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hardness vs randomness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pseudorandom generators for space-bounded computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pseudorandomness for network algorithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: INTERSECTION THEOREMS FOR SYSTEMS OF FINITE SETS / rank
 
Normal rank
Property / cites work
 
Property / cites work: Invitation to intersection problems for finite sets / rank
 
Normal rank
Property / cites work
 
Property / cites work: Extremal problems in hypergraph colourings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Superpolynomial size set-systems with restricted intersections mod 6 and explicit Ramsey graphs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Matching Vector Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Cryptographic Complexity of the Worst Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: 2-Server PIR with Sub-Polynomial Communication / rank
 
Normal rank
Property / cites work
 
Property / cites work: 3-query locally decodable codes of subexponential length / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards 3-query locally decodable codes of subexponential length / rank
 
Normal rank
Property / cites work
 
Property / cites work: Conditional disclosure of secrets via non-linear reconstruction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4165427 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4526993 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4228459 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4829810 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Ideal Lattices and Learning with Errors over Rings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Worst-case to average-case reductions for module lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Middle-product Learning with Errors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Obfuscating Conjunctions under Entropic Ring LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Public Key Encryption Based on Ideal Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards attribute-based encryption for RAMs from LWE: sub-linear decryption, and more / rank
 
Normal rank
Property / cites work
 
Property / cites work: FE for inner products and its application to decentralized ABE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trapdoors for hard lattices and new cryptographic constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simultaneous Hardcore Bits and Cryptography against Memory Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption for Inner Product Predicates from Learning with Errors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reusable garbled circuits and succinct functional encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM / rank
 
Normal rank
Property / cites work
 
Property / cites work: Round5: compact and fast post-quantum public-key encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: (Leveled) Fully Homomorphic Encryption without Bootstrapping / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Framework for Efficient and Composable Oblivious Transfer / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two-message statistically sender-private OT from LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: UC-secure OT from LWE, revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice-Based Blind Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice Signatures without Trapdoors / rank
 
Normal rank
Property / cites work
 
Property / cites work: The lattice-based digital signature scheme qTESLA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pseudorandom Functions and Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key Homomorphic PRFs and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: New and Improved Key-Homomorphic Pseudorandom Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Homomorphic Constrained Pseudorandom Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Private Puncturable PRFs from Standard Lattice Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Private constrained PRFs (and more) from LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Watermarking cryptographic functionalities from standard lattice assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Watermarking PRFs from lattices: stronger security via extractable PRFs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Watermarking PRFs under standard assumptions: public marking and security with extraction queries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Secure Matrix Multiplication Over LWE-Based Homomorphic Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: A new secure matrix multiplication from ring-LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Noninteractive zero knowledge for NP from (Plain) Learning With Errors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Graph-Induced Multilinear Maps from Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Multilinear Maps from Ideal Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based (Lossy) Trapdoor Functions and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lossy trapdoor functions and their applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dual Projective Hashing and Its Applications — Lossy Trapdoor Functions and More / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Decade of Lattice Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-key cryptosystems from the worst-case shortest vector problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Classical hardness of learning with errors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hardness of SIS and LWE with Small Parameters / rank
 
Normal rank
Property / cites work
 
Property / cites work: A sieve algorithm for the shortest lattice vector problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Methods for Calculating Vectors of Short Length in a Lattice, Including a Complexity Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rankin’s Constant and Blockwise Lattice Reduction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3549702 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice Enumeration Using Extreme Pruning / rank
 
Normal rank
Property / cites work
 
Property / cites work: Factoring polynomials with rational coefficients / rank
 
Normal rank
Property / cites work
 
Property / cites work: The LLL algorithm. Survey and applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sieve algorithms for the shortest vector problem are practical / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5417723 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A deterministic single exponential time algorithm for most lattice problems based on voronoi cell computations / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the computation of lattice vectors of minimal length, successive minima and reduced bases with applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: A hierarchy of polynomial time lattice basis reduction algorithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice basis reduction: Improved practical algorithms and solving subset sum problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2757225 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An LLL Algorithm with Quadratic Complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4938616 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller / rank
 
Normal rank
Property / cites work
 
Property / cites work: Approximate trapdoors for lattices and smaller hash-and-sign signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: All-but-many lossy trapdoor functions from lattices and applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: All-But-Many Lossy Trapdoor Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simple Lattice Trapdoor Sampling from a Broad Class of Distributions / rank
 
Normal rank
Property / cites work
 
Property / cites work: On secret sharing systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Linear Secret Sharing for Connectivity in Directed Graphs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reachability is harder for directed than for undirected finite graphs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Representing Boolean functions as polynomials modulo composite numbers / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Lambert \(w\) function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3684278 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3231324 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proofs that ∑1/p Diverges / rank
 
Normal rank

Latest revision as of 19:41, 26 July 2024

scientific article
Language Label Description Also known as
English
Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
scientific article

    Statements

    Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification (English)
    0 references
    0 references
    0 references
    0 references
    6 October 2021
    0 references
    0 references
    learning with errors
    0 references
    secret sharing
    0 references
    hidden access structures
    0 references
    PRIM-LWE
    0 references
    extremal set theory
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references