Leakage-Resilient Secret Sharing in Non-Compartmentalized Models.
From MaRDI portal
Publication:6059366
Recommendations
- Leakage resilient secret sharing and applications
- Lower bounds for leakage-resilient secret sharing
- New bounds on the local leakage resilience of Shamir's secret sharing scheme
- Stronger lower bounds for leakage-resilient secret sharing
- On the local leakage resilience of linear secret sharing schemes
Cited in
(11)- Short leakage resilient and non-malleable secret sharing schemes
- Leakage-resilience of the Shamir secret-sharing scheme against physical-bit leakages
- Leakage and protocol composition in a game-theoretic perspective
- Protecting distributed primitives against leakage: equivocal secret sharing and more
- Leakage-resilient linear secret-sharing against arbitrary bounded-size leakage family
- Nonmalleable extractors and codes, with their many tampered extensions
- The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free
- On the local leakage resilience of linear secret sharing schemes
- Constructing locally leakage-resilient linear secret-sharing schemes
- On secret sharing, randomness, and random-less reductions for secret sharing
- Tamper and Leakage Resilience in the Split-State Model
This page was built for publication: Leakage-Resilient Secret Sharing in Non-Compartmentalized Models.
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6059366)