Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
From MaRDI portal
Publication:5458609
DOI10.1007/978-3-540-78967-3_27zbMATH Open1149.94333OpenAlexW1490273987MaRDI QIDQ5458609FDOQ5458609
Authors: Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padró, Daniel Wichs
Publication date: 15 April 2008
Published in: Advances in Cryptology – EUROCRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78967-3_27
Recommendations
Cited In (53)
- Circular external difference families, graceful labellings and cyclotomy
- Robustly reusable fuzzy extractor from isogeny
- Decomposing complete graphs into isomorphic complete multipartite graphs
- Upgrading fuzzy extractors
- On related-secret pseudorandomness
- On complete primitives for fairness
- Existence and non-existence results for strong external difference families
- A new class of security oriented error correcting robust codes
- Robustly reusable fuzzy extractor with imperfect randomness
- Construction and nonexistence of strong external difference families
- Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes
- On encoding polynomials for strong algebraic manipulation detection codes
- Disjoint difference families and their applications
- Robustly reusable fuzzy extractor from standard assumptions
- Round-optimal secure multi-party computation
- Reusable fuzzy extractor from the decisional Diffie-Hellman assumption
- On the equivalence of authentication codes and robust (2, 2)-threshold schemes
- Optimal computational split-state non-malleable codes
- Nonmalleable digital lockers and robust fuzzy extractors in the plain model
- LWE without modular reduction and improved side-channel attacks against BLISS
- Binary AMD circuits from secure multiparty computation
- How to make the Cramer-Shoup cryptosystem secure against linear related-key attacks
- Codes for detection of limited view algebraic tampering
- Robustly reusable fuzzy extractors in a post-quantum world
- Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families
- A generic construction of fuzzy signature
- Arithmetic sketching
- Efficient error-correcting codes for sliding windows
- Algebraic manipulation detection codes via highly nonlinear functions
- Non-Malleable Codes from Additive Combinatorics
- Leakage Resilient Cheating Detectable Secret Sharing Schemes
- Nonexistence of strong external difference families in abelian groups of order being product of at most three primes
- Reusable fuzzy extractors for low-entropy distributions
- Detecting algebraic manipulation in leaky storage systems
- Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness
- Going beyond dual execution: MPC for functions with efficient verification
- Nearly optimal robust secret sharing against rushing adversaries
- An Improved Robust Fuzzy Extractor
- Detection of algebraic manipulation in the presence of leakage
- On optimal weak algebraic manipulation detection codes and weighted external difference families
- Nearly optimal robust secret sharing
- (Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates
- Ramp secret sharing with cheater identification in presence of rushing cheaters
- Key Agreement from Close Secrets over Unsecured Channels
- Algebraic manipulation detection codes
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Weighted external difference families and R-optimal AMD codes
- New existence and nonexistence results for strong external difference families
- Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy
- Some results on generalized strong external difference families
- Non-malleable fuzzy extractors
- Characterising bimodal collections of sets in finite groups
- Efficient robust secret sharing from expander graphs
This page was built for publication: Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458609)