New bounds on the local leakage resilience of Shamir's secret sharing scheme
From MaRDI portal
Publication:6186590
Recommendations
- Leakage-resilience of the Shamir secret-sharing scheme against physical-bit leakages
- Lower bounds for leakage-resilient secret sharing
- Stronger lower bounds for leakage-resilient secret sharing
- Towards breaking the half-barrier of local leakage-resilient Shamir's secret sharing
- Tight estimate of the local leakage resilience of the additive secret-sharing scheme \& its consequences
Cites work
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- Adaptive extractors and their application to leakage resilient secret sharing
- Advances in Cryptology - CRYPTO 2003
- Constructing locally leakage-resilient linear secret-sharing schemes
- Fully leakage-resilient signatures
- How to compute under \({\mathcal{AC}}^{0}\) leakage without secure hardware
- How to share a function securely
- How to share a secret
- Leakage resilient secret sharing and applications
- Leakage-resilience of the Shamir secret-sharing scheme against physical-bit leakages
- Leakage-resilient storage
- Lower bounds for leakage-resilient secret sharing
- Non-malleable secret sharing
- Non-malleable secret sharing for general access structures
- On the local leakage resilience of linear secret sharing schemes
- On the local leakage resilience of linear secret sharing schemes
- Protecting circuits from computationally bounded and noisy leakage
- Public-key cryptosystems resilient to key leakage
- Repairing Reed-Solomon Codes
- Short leakage resilient and non-malleable secret sharing schemes
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Theory of Cryptography
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
Cited in
(6)- Tight estimate of the local leakage resilience of the additive secret-sharing scheme \& its consequences
- Leakage-Resilient Secret Sharing in Non-Compartmentalized Models.
- Stronger lower bounds for leakage-resilient secret sharing
- Protecting distributed primitives against leakage: equivocal secret sharing and more
- Constructing leakage-resilient Shamir's secret sharing: over composite order fields
- Towards breaking the half-barrier of local leakage-resilient Shamir's secret sharing
This page was built for publication: New bounds on the local leakage resilience of Shamir's secret sharing scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6186590)