Secure Computation from Random Error Correcting Codes
From MaRDI portal
Publication:5429397
Recommendations
- Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields
- Near-optimal secret sharing and error correcting codes in \(\mathsf{AC}^0\)
- Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions
- Nearly optimal robust secret sharing
- On the complexity of arithmetic secret sharing
Cited in
(45)- The optimal linear secret sharing scheme for any given access structure
- Geometric and Computational Approach to Classical and Quantum Secret Sharing
- Generalized fuzzy password-authenticated key exchange from error correcting codes
- Theory of supports for linear codes endowed with the sum-rank metric
- A Probabilistic Error-Correcting Scheme that Provides Partial Secrecy
- On \(d\)-multiplicative secret sharing
- Polynomial evaluation and side channel analysis
- On the construction of \((n,k)\)-schemes of visual cryptography using a class of linear hash functions over a binary field
- Conditional disclosure of secrets: amplification, closure, amortization, lower-bounds, and separations
- Higher Hamming weights for locally recoverable codes on algebraic curves
- Three-level secret sharing schemes from the twisted cubic
- Smoothing out binary linear codes and worst-case sub-exponential hardness for LPN
- Asymptotically good multiplicative LSSS over Galois rings and applications to MPC over \(\mathbb{Z}/p^k\mathbb{Z} \)
- Recent advances in non-perfect secret sharing schemes
- On secret sharing with nonlinear product reconstruction
- Refined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth's second tower
- Ramp hyper-invertible matrices and their applications to MPC protocols
- Secure Erasure Codes With Partial Reconstructibility
- Blakley type secret sharing scheme based on the intersection of subspaces
- Towards secure two-party computation from the wire-tap channel
- A random encoding method for secure data communication: An extension of sequential coding
- OT-Combiners via Secure Computation
- Secret sharing schemes with strong multiplication and a large number of players from toric varieties
- Classical access structures of ramp secret sharing based on quantum stabilizer codes
- How to recover a secret with \(O(n)\) additions
- Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves
- Zero-knowledge IOPs with linear-time prover and polylogarithmic-time verifier
- Blackbox secret sharing revisited: a coding-theoretic approach with application to expansionless near-threshold schemes
- Evolving ramp secret sharing with a small gap
- A note on ramp secret sharing schemes from error-correcting codes
- Algebraic geometric secret sharing schemes over large fields are asymptotically threshold
- Relative generalized Hamming weights of \(q\)-ary Reed-Muller codes
- Encryption and Error-Correction Coding Using D Sequences
- Near-optimal secret sharing and error correcting codes in \(\mathsf{AC}^0\)
- Isolated Proofs of Knowledge and Isolated Zero Knowledge
- Stochastic secret sharing with 1-bit shares and applications to MPC
- Traceable secret sharing: strong security and efficient constructions
- A simple combinatorial treatment of constructions and threshold gaps of ramp schemes
- A linear code based on resilient Boolean maps whose dual is a platform for a robust secret sharing scheme
- Two new classes of Hermitian self-orthogonal non-GRS MDS codes and their applications
- Message randomization and strong security in quantum stabilizer-based secret sharing for classical secrets
- Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures
- Secret Sharing Schemes with Algebraic Properties and Applications
- Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields
- Interactive function computation via polar coding
This page was built for publication: Secure Computation from Random Error Correcting Codes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5429397)