Secret-Sharing Schemes: A Survey
From MaRDI portal
Publication:3005578
DOI10.1007/978-3-642-20901-7_2zbMath1272.94074OpenAlexW51265332MaRDI QIDQ3005578
Publication date: 8 June 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-20901-7_2
Analysis of algorithms and problem complexity (68Q25) Data encryption (aspects in computer science) (68P25) Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02) Authentication, digital signatures and secret sharing (94A62)
Related Items (86)
Upslices, downslices, and secret-sharing with complexity of \(1.5^n\) ⋮ Quadratic secret sharing and conditional disclosure of secrets ⋮ Secret-sharing schemes for very dense graphs ⋮ Cutting-edge cryptography through the lens of secret sharing ⋮ On the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rate ⋮ ZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher calls ⋮ Optimal linear secret sharing schemes for graph access structures on six participants ⋮ Secret sharing on large girth graphs ⋮ Secret Sharing for mNP: Completeness Results ⋮ Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption ⋮ Threshold Secret Sharing Requires a Linear Size Alphabet ⋮ How to Share a Secret, Infinitely ⋮ Towards breaking the exponential barrier for general secret sharing ⋮ Improving the linear programming technique in the search for lower bounds in secret sharing ⋮ Recent Advances in Non-perfect Secret Sharing Schemes ⋮ Secret-sharing for NP ⋮ The \(\varepsilon\)-\(t\)-net problem ⋮ Abelian sharing, common informations, and linear rank inequalities ⋮ Distributive weighted threshold secret sharing schemes ⋮ Secure Two-Party Computation: A Visual Way ⋮ New classes of codes over \(R_{q,p,m}=\mathbb{Z}_{p^m}[u_1, u_2, \dots , u_q/ \langle u_i^2=0,u_iu_j=u_ju_i\rangle\) and their applications] ⋮ Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013 ⋮ Local bounds for the optimal information ratio of secret sharing schemes ⋮ Quantum attribute-based encryption: a comprehensive study ⋮ Semi-quantum cryptography ⋮ On the information ratio of non-perfect secret sharing schemes ⋮ Access structures determined by uniform polymatroids ⋮ On ideal and weakly-ideal access structures ⋮ Bipartite secret sharing and staircases ⋮ Threshold signatures with private accountability ⋮ How to recover a secret with \(O(n)\) additions ⋮ Ideal uniform multipartite secret sharing schemes ⋮ Brief Announcement: Breaking the f + 1 Barrier: Executing Payment Transactions in Parallel with Less than f + 1 Validations ⋮ Finding lower bounds on the complexity of secret sharing schemes by linear programming ⋮ Ideal hierarchical secret sharing and lattice path matroids ⋮ Smart elements in combinatorial group testing problems with more defectives ⋮ Algebraic manipulation detection codes ⋮ Secret sharing on regular bipartite access structures ⋮ Constructing ideal secret sharing schemes based on Chinese remainder theorem ⋮ Secure message transmission on directed networks ⋮ Long term confidentiality: a survey ⋮ Common information, matroid representation, and secret sharing for matroid ports ⋮ Secret sharing schemes for infinite sets of participants: a new design technique ⋮ Operations over Linear Secret Sharing Schemes ⋮ Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification ⋮ Probabilistic secret sharing ⋮ New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structures ⋮ Efficient robust secret sharing from expander graphs ⋮ Construction of arithmetic secret sharing schemes by using torsion limits ⋮ Secure computation without computers ⋮ Secret sharing schemes for compartmented access structures ⋮ Smart elements in combinatorial group testing problems ⋮ Finding the maximal adversary structure from any given access structure ⋮ Extending Brickell-Davenport theorem to non-perfect secret sharing schemes ⋮ Simplifying Design and Analysis of Complex Predicate Encryption Schemes ⋮ Secret sharing on the \(d\)-dimensional cube ⋮ Secret sharing schemes based on graphical codes ⋮ How to share a secret ⋮ Leakage Resilient Cheating Detectable Secret Sharing Schemes ⋮ Threshold secret sharing with geometric algebras ⋮ NP-hardness of approximating meta-complexity: a cryptographic approach ⋮ Reduced access structures with four minimal qualified subsets on six participants ⋮ Threshold Secret Sharing Through Multivariate Birkhoff Interpolation ⋮ Classes of matroids closed under minors and principal extensions ⋮ Secret sharing and duality ⋮ The exact values of the optimal average information ratio of perfect secret-sharing schemes for tree-based access structures ⋮ A Study of Pair Encodings: Predicate Encryption in Prime Order Groups ⋮ Cutting-Edge Cryptography Through the Lens of Secret Sharing ⋮ Using multiobjective optimization to map the entropy region ⋮ Tag-based ABE in prime-order groups via pair encoding ⋮ On abelian and homomorphic secret sharing schemes ⋮ Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing ⋮ Lower bounds for leakage-resilient secret sharing ⋮ Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme ⋮ Practical Fault-Tolerant Data Aggregation ⋮ Generic negation of pair encodings ⋮ Secret Sharing Schemes for Dense Forbidden Graphs ⋮ Unnamed Item ⋮ Cooperative secret sharing using QR codes and symmetric keys ⋮ Efficient explicit constructions of compartmented secret sharing schemes ⋮ Practically Efficient Secure Single-Commodity Multi-market Auctions ⋮ Secret sharing schemes for ports of matroids of rank 3 ⋮ Nearly optimal robust secret sharing against rushing adversaries ⋮ Roughly weighted hierarchical simple games ⋮ Some Open Problems in Information-Theoretic Cryptography ⋮ Practical (fully) distributed signatures provably secure in the standard model
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On secret sharing schemes
- Generalized oblivious transfer by secret sharing
- On the information rate of secret sharing schemes
- Lower bounds for monotone span programs
- Improved constructions of secret sharing schemes by applying \((\lambda ,\omega )\)-decompositions
- A note on monotone complexity and the rank of matrices
- Monotone circuits for monotone weighted threshold functions
- On the classification of ideal secret sharing schemes
- Secret sharing over infinite domains
- On the size of shares for secret sharing schemes
- Tight bounds on the information rate of secret sharing schemes
- The size of a share must be large
- Almost affine codes
- A characterization of span program size and improved lower bounds for monotone span programs
- On the information rate of perfect secret sharing schemes
- Player simulation and general adversary structures in perfect multiparty computation
- Superpolynomial lower bounds for monotone span programs
- Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
- How to share a secret
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- On Linear Secret Sharing for Connectivity in Directed Graphs
- Multipartite Secret Sharing by Bivariate Interpolation
- On Secret Sharing Schemes, Matroids and Polymatroids
- Secret Sharing and Non-Shannon Information Inequalities
- Simple Constructions of Almost k-wise Independent Random Variables
- A Pseudorandom Generator from any One-way Function
- Decomposition constructions for secret-sharing schemes
- On characterization of entropy function via information inequalities
- On secret sharing systems
- Universally ideal secret-sharing schemes
- Communication Complexity
- Separating the Power of Monotone Span Programs over Different Fields
- On the Power of Nonlinear Secret-Sharing
- Fuzzy Identity-Based Encryption
- Progress in Cryptology - INDOCRYPT 2003
- Matroids Can Be Far from Ideal Secret Sharing
- Alternative Protocols for Generalized Oblivious Transfer
- Theory of Cryptography
This page was built for publication: Secret-Sharing Schemes: A Survey