Upslices, downslices, and secret-sharing with complexity of 1.5ⁿ
From MaRDI portal
Publication:2129013
DOI10.1007/978-3-030-84252-9_21zbMATH Open1487.94147OpenAlexW3158616655MaRDI QIDQ2129013FDOQ2129013
Publication date: 22 April 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84252-9_21
Recommendations
- Towards breaking the exponential barrier for general secret sharing
- Breaking the circuit-size barrier in secret sharing
- Publication:3202940
- Secret sharing lower bound: either reconstruction is hard or shares are long
- The share size of secret-sharing schemes for almost all access structures and graphs
Cites Work
- How to share a secret
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Multiple assignment scheme for sharing secret
- The size of a share must be large
- Secret-Sharing Schemes: A Survey
- Title not available (Why is that?)
- Title not available (Why is that?)
- Alternative Protocols for Generalized Oblivious Transfer
- Generalized oblivious transfer by secret sharing
- Title not available (Why is that?)
- A minimal model for secure computation (extended abstract)
- Zero-information protocols and unambiguity in Arthur-Merlin communication
- Title not available (Why is that?)
- Secret-sharing schemes for general and uniform access structures
- Advances in Cryptology - EUROCRYPT 2004
- Title not available (Why is that?)
- Linear secret-sharing schemes for forbidden graph access structures
- Secret sharing and duality
- Title not available (Why is that?)
- Strongly exponential lower bounds for monotone computation
- Lifting Nullstellensatz to monotone span programs over any field
- Distribution design
- Towards breaking the exponential barrier for general secret sharing
- Breaking the circuit-size barrier in secret sharing
- The share size of secret-sharing schemes for almost all access structures and graphs
- Better secret sharing via robust conditional disclosure of secrets
Cited In (4)
This page was built for publication: Upslices, downslices, and secret-sharing with complexity of \(1.5^n\)
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2129013)