Threshold Secret Sharing Requires a Linear Size Alphabet
From MaRDI portal
Publication:3181037
DOI10.1007/978-3-662-53644-5_18zbMath1412.94222OpenAlexW2539290340MaRDI QIDQ3181037
Siyao Guo, Ilan Komargodski, Andrej Bogdanov
Publication date: 22 December 2016
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53644-5_18
Related Items (9)
How to Share a Secret, Infinitely ⋮ On the information ratio of non-perfect secret sharing schemes ⋮ Full threshold change range of threshold changeable secret sharing ⋮ Strongly secure quantum ramp secret sharing constructed from algebraic curves over finite fields ⋮ Probabilistic secret sharing ⋮ Unnamed Item ⋮ Blackbox secret sharing revisited: a coding-theoretic approach with application to expansionless near-threshold schemes ⋮ Evolving ramp secret sharing with a small gap ⋮ Lower bounds for leakage-resilient secret sharing
Cites Work
- Unnamed Item
- An application of ramp schemes to broadcast encryption
- A simple combinatorial treatment of constructions and threshold gaps of ramp schemes
- Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures
- Lower bounds for monotone span programs
- Multiple assignment scheme for sharing secret
- On the size of shares for secret sharing schemes
- The size of a share must be large
- A characterization of span program size and improved lower bounds for monotone span programs
- Superpolynomial lower bounds for monotone span programs
- Bounded Indistinguishability and the Complexity of Recovering Secrets
- Optimal Non-perfect Uniform Secret Sharing Schemes
- Security of Ramp Schemes
- Secret Sharing, Rank Inequalities, and Information Inequalities
- Secret-Sharing Schemes: A Survey
- How to share a secret
- How to Share a Secret, Infinitely
- Weakly-Private Secret Sharing Schemes
- Universally ideal secret-sharing schemes
- Secret Sharing and Non-Shannon Information Inequalities
- Bounds on the Threshold Gap in Secret Sharing and its Applications
- Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields
- Secure Multiparty Computation and Secret Sharing
- Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields
This page was built for publication: Threshold Secret Sharing Requires a Linear Size Alphabet