Leakage resilient secret sharing and applications
From MaRDI portal
Publication:2304991
DOI10.1007/978-3-030-26951-7_17OpenAlexW2967582826MaRDI QIDQ2304991
Prashant Nalini Vasudevan, Akshayaram Srinivasan
Publication date: 9 March 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-26951-7_17
Cryptography (94A60) Theory of compilers and interpreters (68N20) Authentication, digital signatures and secret sharing (94A62)
Related Items (20)
Adaptive extractors and their application to leakage resilient secret sharing ⋮ Traceable secret sharing and applications ⋮ Constructing locally leakage-resilient linear secret-sharing schemes ⋮ Secret sharing with statistical privacy and computational relaxed non-malleability ⋮ Constant-round leakage-resilient zero-knowledge from collision resistance ⋮ ZK-PCPs from leakage-resilient secret sharing ⋮ Enabling cloud storage auditing with key-exposure resilience under continual key-leakage ⋮ Continuously non-malleable secret sharing for general access structures ⋮ Short leakage resilient and non-malleable secret sharing schemes ⋮ On secret sharing, randomness, and random-less reductions for secret sharing ⋮ Leakage-resilient linear secret-sharing against arbitrary bounded-size leakage family ⋮ New bounds on the local leakage resilience of Shamir's secret sharing scheme ⋮ Continuously non-malleable secret sharing: joint tampering, plain model and capacity ⋮ Key exposure resistant group key agreement protocol ⋮ On the local leakage resilience of linear secret sharing schemes ⋮ Fair hierarchical secret sharing scheme based on smart contract ⋮ Leakage-resilience of the Shamir secret-sharing scheme against physical-bit leakages ⋮ The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free ⋮ Multi-source non-malleable extractors and applications ⋮ Non-malleable secret sharing against bounded joint-tampering attacks in the plain model
This page was built for publication: Leakage resilient secret sharing and applications