Leakage resilient secret sharing and applications

From MaRDI portal
Publication:2304991

DOI10.1007/978-3-030-26951-7_17OpenAlexW2967582826MaRDI QIDQ2304991

Prashant Nalini Vasudevan, Akshayaram Srinivasan

Publication date: 9 March 2020

Full work available at URL: https://doi.org/10.1007/978-3-030-26951-7_17




Related Items (20)

Adaptive extractors and their application to leakage resilient secret sharingTraceable secret sharing and applicationsConstructing locally leakage-resilient linear secret-sharing schemesSecret sharing with statistical privacy and computational relaxed non-malleabilityConstant-round leakage-resilient zero-knowledge from collision resistanceZK-PCPs from leakage-resilient secret sharingEnabling cloud storage auditing with key-exposure resilience under continual key-leakageContinuously non-malleable secret sharing for general access structuresShort leakage resilient and non-malleable secret sharing schemesOn secret sharing, randomness, and random-less reductions for secret sharingLeakage-resilient linear secret-sharing against arbitrary bounded-size leakage familyNew bounds on the local leakage resilience of Shamir's secret sharing schemeContinuously non-malleable secret sharing: joint tampering, plain model and capacityKey exposure resistant group key agreement protocolOn the local leakage resilience of linear secret sharing schemesFair hierarchical secret sharing scheme based on smart contractLeakage-resilience of the Shamir secret-sharing scheme against physical-bit leakagesThe mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for freeMulti-source non-malleable extractors and applicationsNon-malleable secret sharing against bounded joint-tampering attacks in the plain model




This page was built for publication: Leakage resilient secret sharing and applications