Secret-Sharing Schemes: A Survey

From MaRDI portal
Revision as of 21:33, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3005578

DOI10.1007/978-3-642-20901-7_2zbMath1272.94074OpenAlexW51265332MaRDI QIDQ3005578

Amos Beimel

Publication date: 8 June 2011

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-20901-7_2




Related Items (86)

Upslices, downslices, and secret-sharing with complexity of \(1.5^n\)Quadratic secret sharing and conditional disclosure of secretsSecret-sharing schemes for very dense graphsCutting-edge cryptography through the lens of secret sharingOn the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rateZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher callsOptimal linear secret sharing schemes for graph access structures on six participantsSecret sharing on large girth graphsSecret Sharing for mNP: Completeness ResultsCommunication Complexity of Conditional Disclosure of Secrets and Attribute-Based EncryptionThreshold Secret Sharing Requires a Linear Size AlphabetHow to Share a Secret, InfinitelyTowards breaking the exponential barrier for general secret sharingImproving the linear programming technique in the search for lower bounds in secret sharingRecent Advances in Non-perfect Secret Sharing SchemesSecret-sharing for NPThe \(\varepsilon\)-\(t\)-net problemAbelian sharing, common informations, and linear rank inequalitiesDistributive weighted threshold secret sharing schemesSecure Two-Party Computation: A Visual WayNew classes of codes over \(R_{q,p,m}=\mathbb{Z}_{p^m}[u_1, u_2, \dots , u_q/ \langle u_i^2=0,u_iu_j=u_ju_i\rangle\) and their applications] ⋮ Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013Local bounds for the optimal information ratio of secret sharing schemesQuantum attribute-based encryption: a comprehensive studySemi-quantum cryptographyOn the information ratio of non-perfect secret sharing schemesAccess structures determined by uniform polymatroidsOn ideal and weakly-ideal access structuresBipartite secret sharing and staircasesThreshold signatures with private accountabilityHow to recover a secret with \(O(n)\) additionsIdeal uniform multipartite secret sharing schemesBrief Announcement: Breaking the f + 1 Barrier: Executing Payment Transactions in Parallel with Less than f + 1 ValidationsFinding lower bounds on the complexity of secret sharing schemes by linear programmingIdeal hierarchical secret sharing and lattice path matroidsSmart elements in combinatorial group testing problems with more defectivesAlgebraic manipulation detection codesSecret sharing on regular bipartite access structuresConstructing ideal secret sharing schemes based on Chinese remainder theoremSecure message transmission on directed networksLong term confidentiality: a surveyCommon information, matroid representation, and secret sharing for matroid portsSecret sharing schemes for infinite sets of participants: a new design techniqueOperations over Linear Secret Sharing SchemesExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationProbabilistic secret sharingNew bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structuresEfficient robust secret sharing from expander graphsConstruction of arithmetic secret sharing schemes by using torsion limitsSecure computation without computersSecret sharing schemes for compartmented access structuresSmart elements in combinatorial group testing problemsFinding the maximal adversary structure from any given access structureExtending Brickell-Davenport theorem to non-perfect secret sharing schemesSimplifying Design and Analysis of Complex Predicate Encryption SchemesSecret sharing on the \(d\)-dimensional cubeSecret sharing schemes based on graphical codesHow to share a secretLeakage Resilient Cheating Detectable Secret Sharing SchemesThreshold secret sharing with geometric algebrasNP-hardness of approximating meta-complexity: a cryptographic approachReduced access structures with four minimal qualified subsets on six participantsThreshold Secret Sharing Through Multivariate Birkhoff InterpolationClasses of matroids closed under minors and principal extensionsSecret sharing and dualityThe exact values of the optimal average information ratio of perfect secret-sharing schemes for tree-based access structuresA Study of Pair Encodings: Predicate Encryption in Prime Order GroupsCutting-Edge Cryptography Through the Lens of Secret SharingUsing multiobjective optimization to map the entropy regionTag-based ABE in prime-order groups via pair encodingOn abelian and homomorphic secret sharing schemesExploiting the Error Correction Mechanism in QR Codes for Secret SharingLower bounds for leakage-resilient secret sharingRevisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing SchemePractical Fault-Tolerant Data AggregationGeneric negation of pair encodingsSecret Sharing Schemes for Dense Forbidden GraphsUnnamed ItemCooperative secret sharing using QR codes and symmetric keysEfficient explicit constructions of compartmented secret sharing schemesPractically Efficient Secure Single-Commodity Multi-market AuctionsSecret sharing schemes for ports of matroids of rank 3Nearly optimal robust secret sharing against rushing adversariesRoughly weighted hierarchical simple gamesSome Open Problems in Information-Theoretic CryptographyPractical (fully) distributed signatures provably secure in the standard model




Cites Work




This page was built for publication: Secret-Sharing Schemes: A Survey