Non-malleable secret sharing against bounded joint-tampering attacks in the plain model
From MaRDI portal
Publication:2102060
DOI10.1007/978-3-030-56877-1_5zbMATH Open1504.94205OpenAlexW3037437399MaRDI QIDQ2102060FDOQ2102060
Authors: Gianluca Brian, Antonio Faonio, Maciej Obremski, Mark Simkin, D. Venturi
Publication date: 7 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-56877-1_5
Recommendations
Cites Work
- How to share a secret
- Non-malleable codes
- Title not available (Why is that?)
- Non-malleable codes from two-source extractors
- Tamper and Leakage Resilience in the Split-State Model
- Capacity of non-malleable codes
- Continuous non-malleable codes
- Non-malleable reductions and applications
- Title not available (Why is that?)
- Leakage-resilient non-malleable codes
- Non-malleable extractors and codes, with their many tampered extensions
- Continuously non-malleable codes in the split-state model from minimal assumptions
- Non-malleable secret sharing for general access structures
- Non-malleable secret sharing against bounded joint-tampering attacks in the plain model
- Continuously non-malleable secret sharing for general access structures
- Revisiting non-malleable secret sharing
- Non-malleable secret sharing in the computational setting: adaptive tampering, noisy-leakage resilience, and improved rate
- Leakage resilient secret sharing and applications
- Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures
- Non-malleable secret sharing
- Inception makes non-malleable codes stronger
- Continuous non-malleable codes in the 8-split-state model
- Optimal computational split-state non-malleable codes
- Improved non-malleable extractors, non-malleable codes and independent source extractors
- Lower bounds for leakage-resilient secret sharing
- Continuously non-malleable codes with split-state refresh
- Rate-optimizing compilers for continuously non-malleable codes
Cited In (14)
- Continuously non-malleable codes against bounded-depth tampering
- Secret sharing with statistical privacy and computational relaxed non-malleability
- Non-malleable secret sharing for general access structures
- Non-malleable secret sharing against bounded joint-tampering attacks in the plain model
- Continuously non-malleable secret sharing for general access structures
- Revisiting non-malleable secret sharing
- Non-malleable secret sharing in the computational setting: adaptive tampering, noisy-leakage resilience, and improved rate
- (Nondeterministic) hardness vs. non-malleability
- Unconditionally Secure Non-malleable Secret Sharing and Circular External Difference Families
- Short leakage resilient and non-malleable secret sharing schemes
- Locally Reconstructable Non-malleable Secret Sharing
- Continuously non-malleable secret sharing: joint tampering, plain model and capacity
- Non-malleable secret sharing
- Adaptive extractors and their application to leakage resilient secret sharing
This page was built for publication: Non-malleable secret sharing against bounded joint-tampering attacks in the plain model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2102060)