Upslices, downslices, and secret-sharing with complexity of 1.5ⁿ
From MaRDI portal
Publication:2129013
Recommendations
- Towards breaking the exponential barrier for general secret sharing
- Breaking the circuit-size barrier in secret sharing
- Publication:3202940
- Secret sharing lower bound: either reconstruction is hard or shares are long
- The share size of secret-sharing schemes for almost all access structures and graphs
Cites work
- scientific article; zbMATH DE number 4179276 (Why is no real title available?)
- scientific article; zbMATH DE number 176567 (Why is no real title available?)
- scientific article; zbMATH DE number 3482343 (Why is no real title available?)
- scientific article; zbMATH DE number 503242 (Why is no real title available?)
- scientific article; zbMATH DE number 708803 (Why is no real title available?)
- scientific article; zbMATH DE number 1024000 (Why is no real title available?)
- A minimal model for secure computation (extended abstract)
- Advances in Cryptology - EUROCRYPT 2004
- Alternative Protocols for Generalized Oblivious Transfer
- Better secret sharing via robust conditional disclosure of secrets
- Breaking the circuit-size barrier in secret sharing
- Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
- Distribution design
- Generalized oblivious transfer by secret sharing
- How to share a secret
- Lifting Nullstellensatz to monotone span programs over any field
- Linear secret-sharing schemes for forbidden graph access structures
- Multiple assignment scheme for sharing secret
- Secret sharing and duality
- Secret-Sharing Schemes: A Survey
- Secret-sharing schemes for general and uniform access structures
- Strongly exponential lower bounds for monotone computation
- The share size of secret-sharing schemes for almost all access structures and graphs
- The size of a share must be large
- Towards breaking the exponential barrier for general secret sharing
- Zero-information protocols and unambiguity in Arthur-Merlin communication
Cited in
(4)
This page was built for publication: Upslices, downslices, and secret-sharing with complexity of \(1.5^n\)
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2129013)