Adaptive extractors and their application to leakage resilient secret sharing
From MaRDI portal
Publication:2129011
DOI10.1007/978-3-030-84252-9_20zbMATH Open1489.94117OpenAlexW3165271206MaRDI QIDQ2129011FDOQ2129011
Authors: Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
Publication date: 22 April 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84252-9_20
Recommendations
- Short leakage resilient and non-malleable secret sharing schemes
- Leakage resilient secret sharing and applications
- Non-malleable secret sharing in the computational setting: adaptive tampering, noisy-leakage resilience, and improved rate
- Lower bounds for leakage-resilient secret sharing
- Non-malleable secret sharing
Cites Work
- How to share a secret
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Title not available (Why is that?)
- Leakage-resilient storage
- Randomness is linear in space
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Advances in Cryptology - CRYPTO 2003
- Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes
- Exposure-resilient extractors and the derandomization of probabilistic sublinear time
- Tamper and Leakage Resilience in the Split-State Model
- Non-malleable codes from additive combinatorics (extended abstract)
- Non-malleable reductions and applications
- Non-malleable secret sharing against bounded joint-tampering attacks in the plain model
- Continuously non-malleable secret sharing for general access structures
- Revisiting non-malleable secret sharing
- Non-malleable secret sharing in the computational setting: adaptive tampering, noisy-leakage resilience, and improved rate
- Leakage resilient secret sharing and applications
- Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures
- Non-malleable secret sharing
- Amplifying Privacy in Privacy Amplification
- How to compute under \({\mathcal{AC}}^{0}\) leakage without secure hardware
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
- Repairing Reed-solomon codes
- On the local leakage resilience of linear secret sharing schemes
Cited In (7)
- New bounds on the local leakage resilience of Shamir's secret sharing scheme
- Stronger lower bounds for leakage-resilient secret sharing
- Leakage-resilient key exchange and two-seed extractors
- On the connection between leakage tolerance and adaptive security
- Protecting distributed primitives against leakage: equivocal secret sharing and more
- Short leakage resilient and non-malleable secret sharing schemes
- Almost tight multi-user security under adaptive corruptions \& leakages in the standard model
This page was built for publication: Adaptive extractors and their application to leakage resilient secret sharing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2129011)