Detecting Algebraic Manipulation in Leaky Storage Systems
From MaRDI portal
Publication:2953813
DOI10.1007/978-3-319-49175-2_7zbMath1407.94137arXiv1607.00089OpenAlexW2461678157MaRDI QIDQ2953813
Pengwei Wang, Fuchun Lin, Reihaneh Safavi-Naini
Publication date: 6 January 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1607.00089
algebraic manipulation detection (AMD) codesdetection of adversarial noiserobust ramp secret sharing schemewiretap II channel
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Information storage and retrieval of data (68P20)
Related Items (2)
Codes for Detection of Limited View Algebraic Tampering ⋮ The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free
Cites Work
- Strongly secure ramp secret sharing schemes for general access structures
- Detection of Algebraic Manipulation in the Presence of Leakage
- Security of Ramp Schemes
- A Model for Adversarial Wiretap Channels
- How to share a secret
- The Wire-Tap Channel
- Invertible Extractors and Wiretap Protocols
- Advances in Cryptology - EUROCRYPT 2004
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
- Wire-Tap Channel II
This page was built for publication: Detecting Algebraic Manipulation in Leaky Storage Systems