Adaptive extractors and their application to leakage resilient secret sharing
From MaRDI portal
Publication:2129011
Recommendations
- Short leakage resilient and non-malleable secret sharing schemes
- Leakage resilient secret sharing and applications
- Non-malleable secret sharing in the computational setting: adaptive tampering, noisy-leakage resilience, and improved rate
- Lower bounds for leakage-resilient secret sharing
- Non-malleable secret sharing
Cites work
- scientific article; zbMATH DE number 4179276 (Why is no real title available?)
- Advances in Cryptology - CRYPTO 2003
- Amplifying Privacy in Privacy Amplification
- Continuously non-malleable secret sharing for general access structures
- Exposure-resilient extractors and the derandomization of probabilistic sublinear time
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- How to compute under \({\mathcal{AC}}^{0}\) leakage without secure hardware
- How to share a secret
- Leakage resilient secret sharing and applications
- Leakage-resilient storage
- Non-malleable codes from additive combinatorics (extended abstract)
- Non-malleable reductions and applications
- Non-malleable secret sharing
- Non-malleable secret sharing against bounded joint-tampering attacks in the plain model
- Non-malleable secret sharing in the computational setting: adaptive tampering, noisy-leakage resilience, and improved rate
- On the local leakage resilience of linear secret sharing schemes
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
- Randomness is linear in space
- Repairing Reed-solomon codes
- Revisiting non-malleable secret sharing
- Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures
- Tamper and Leakage Resilience in the Split-State Model
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes
Cited in
(7)- Almost tight multi-user security under adaptive corruptions \& leakages in the standard model
- Short leakage resilient and non-malleable secret sharing schemes
- Protecting distributed primitives against leakage: equivocal secret sharing and more
- New bounds on the local leakage resilience of Shamir's secret sharing scheme
- Leakage-resilient key exchange and two-seed extractors
- Stronger lower bounds for leakage-resilient secret sharing
- On the connection between leakage tolerance and adaptive security
This page was built for publication: Adaptive extractors and their application to leakage resilient secret sharing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2129011)