Secret-sharing schemes for general and uniform access structures
From MaRDI portal
Publication:2292702
DOI10.1007/978-3-030-17659-4_15OpenAlexW2932503745MaRDI QIDQ2292702FDOQ2292702
Benny Applebaum, Oded Nir, Oriol Farràs, Naty Peter, Amos Beimel
Publication date: 4 February 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-17659-4_15
Recommendations
Cited In (26)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Secret sharing schemes for ports of matroids of rank 3
- Improved polynomial secret-sharing schemes
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- Linear Threshold Secret-Sharing with Binary Reconstruction
- Generalised cumulative arrays in secret sharing
- Quadratic secret sharing and conditional disclosure of secrets
- Upslices, downslices, and secret-sharing with complexity of \(1.5^n\)
- Public Key Cryptography - PKC 2006
- Efficient oblivious evaluation protocol and conditional disclosure of secrets for DFA
- Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures
- Function-private conditional disclosure of secrets and multi-evaluation threshold distributed point functions
- Cryptography with weights: MPC, encryption and signatures
- An efficient and secure multi-secret sharing scheme with general access structures
- On abelian and homomorphic secret sharing schemes
- Title not available (Why is that?)
- Generation of key predistribution schemes using secret sharing schemes
- Multi-party PSM, revisited: improved communication and unbalanced communication
- Title not available (Why is that?)
- Secret sharing with certified deletion
- Succinct computational secret sharing
- Secret sharing schemes with bipartite access structure
- Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations
- Title not available (Why is that?)
- Verification protocol for stable matching from conditional disclosure of secrets
This page was built for publication: Secret-sharing schemes for general and uniform access structures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2292702)