Breaking the circuit-size barrier in secret sharing
From MaRDI portal
Publication:5230331
Recommendations
- Towards breaking the exponential barrier for general secret sharing
- Secret-Sharing Schemes: A Survey
- The share size of secret-sharing schemes for almost all access structures and graphs
- Secret sharing lower bound: either reconstruction is hard or shares are long
- scientific article; zbMATH DE number 176543
Cited in
(31)- Measuring, simulating and exploiting the head concavity phenomenon in BKZ
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- Efficient oblivious evaluation protocol and conditional disclosure of secrets for DFA
- The share size of secret-sharing schemes for almost all access structures and graphs
- Cryptography with weights: MPC, encryption and signatures
- Exact information ratios for secret sharing on small graphs with girth at least 5
- Secret sharing with certified deletion
- A secret-sharing based MPC protocol for Boolean circuits with good amortized complexity
- Linear Threshold Secret-Sharing with Binary Reconstruction
- Placing conditional disclosure of secrets in the communication complexity universe
- On the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rate
- Conditional disclosure of secrets: amplification, closure, amortization, lower-bounds, and separations
- Cutting-edge cryptography through the lens of secret sharing
- Succinct computational secret sharing
- Verification protocol for stable matching from conditional disclosure of secrets
- On abelian and homomorphic secret sharing schemes
- Improved polynomial secret-sharing schemes
- Towards breaking the exponential barrier for general secret sharing
- Bounded indistinguishability and the complexity of recovering secrets
- Constraint Satisfaction Problems with Global Modular Constraints: Algorithms and Hardness via Polynomial Representations
- Probabilistic secret sharing
- Optimal linear multiparty conditional disclosure of secrets protocols
- Lower bounds for secret-sharing schemes for \(k\)-hypergraphs
- Quadratic secret sharing and conditional disclosure of secrets
- Upslices, downslices, and secret-sharing with complexity of \(1.5^n\)
- Secret sharing lower bound: either reconstruction is hard or shares are long
- Threshold secret sharing requires a linear-size alphabet
- A simple primal-dual approximation algorithm for 2-edge-connected spanning subgraphs
- Secret sharing schemes for ports of matroids of rank 3.
- Secret-sharing schemes for general and uniform access structures
- scientific article; zbMATH DE number 7559047 (Why is no real title available?)
This page was built for publication: Breaking the circuit-size barrier in secret sharing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5230331)