Adaptive extractors and their application to leakage resilient secret sharing
From MaRDI portal
Publication:2129011
DOI10.1007/978-3-030-84252-9_20zbMath1489.94117OpenAlexW3165271206MaRDI QIDQ2129011
Sruthi Sekar, Sai Lakshmi Bhavana Obbattu, Nishanth Chandran, Bhavana Kanukurthi
Publication date: 22 April 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84252-9_20
Related Items (2)
Short leakage resilient and non-malleable secret sharing schemes ⋮ New bounds on the local leakage resilience of Shamir's secret sharing scheme
Cites Work
- Unnamed Item
- Exposure-resilient extractors and the derandomization of probabilistic sublinear time
- Randomness is linear in space
- Non-malleable secret sharing against bounded joint-tampering attacks in the plain model
- Continuously non-malleable secret sharing for general access structures
- Revisiting non-malleable secret sharing
- Non-malleable secret sharing in the computational setting: adaptive tampering, noisy-leakage resilience, and improved rate
- Leakage resilient secret sharing and applications
- Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures
- Amplifying Privacy in Privacy Amplification
- Tamper and Leakage Resilience in the Split-State Model
- How to Compute under $${\mathcal {\varvec{AC}}}^\mathbf{0}$$ Leakage without Secure Hardware
- Non-malleable Reductions and Applications
- How to share a secret
- Unbalanced expanders and randomness extractors from Parvaresh--Vardy codes
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
- Leakage-Resilient Storage
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Non-malleable secret sharing
- Non-malleable codes from additive combinatorics
- Repairing Reed-solomon codes
- Advances in Cryptology - CRYPTO 2003
- On the local leakage resilience of linear secret sharing schemes
This page was built for publication: Adaptive extractors and their application to leakage resilient secret sharing