Memory leakage-resilient secret sharing schemes
From MaRDI portal
Publication:5046490
DOI10.1007/s11432-015-5385-8zbMath1497.94082OpenAlexW2261087598MaRDI QIDQ5046490
Fangguo Zhang, Jinfeng Wei, Shu-Guang Dai
Publication date: 28 October 2022
Published in: Science China Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11432-015-5385-8
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Leakproof secret sharing protocols with applications to group identification scheme
- New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structures
- An ideal multi-secret sharing scheme based on MSP
- Strong \((n, t, n)\) verifiable secret sharing scheme
- A \((t,n)\) multi-secret sharing scheme
- New efficient and practical verifiable multi-secret sharing schemes
- A new \((t,n)\) multi-secret sharing scheme based on Shamir's secret sharing
- A new efficient \((t,n)\) verifiable multi-secret sharing (VMSS) based on YCH scheme
- Secure Computation against Adaptive Auxiliary Information
- Interactive Proofs under Continual Memory Leakage
- Publicly Verifiable Secret Sharing
- Identity-Based Encryption Resilient to Continual Auxiliary Leakage
- Achieving Leakage Resilience through Dual System Encryption
- Signatures Resilient to Continual Leakage on Memory and Computation
- How to share a secret
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
- Signature Schemes with Bounded Leakage Resilience
- Physically Uncloneable Functions in the Universal Composition Framework
- Leakage-Resilient Zero Knowledge
- Multiparty computation secure against continual memory leakage
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
This page was built for publication: Memory leakage-resilient secret sharing schemes