How to recover a secret with O(n) additions
DOI10.1007/978-3-031-38557-5_8OpenAlexW4385654309MaRDI QIDQ6186593FDOQ6186593
Oded Nir, Benny Applebaum, Benny Pinkas
Publication date: 2 February 2024
Published in: Advances in Cryptology – CRYPTO 2023 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-38557-5_8
Data encryption (aspects in computer science) (68P25) Analysis of algorithms and problem complexity (68Q25) Cryptography (94A60) Computational difficulty of problems (lower bounds, completeness, difficulty of approximation, etc.) (68Q17) Distributed systems (68M14) Authentication, digital signatures and secret sharing (94A62) Network protocols (68M12)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Fast modular transforms
- Short signatures from the Weil pairing
- How to share a secret
- On the Evaluation of Powers and Monomials
- Secure Computation from Random Error Correcting Codes
- Secret sharing over infinite domains
- Secret-Sharing Schemes: A Survey
- Founding Cryptography on Oblivious Transfer – Efficiently
- Universally ideal secret-sharing schemes
- A Sample of Samplers: A Computational Perspective on Sampling
- Arithmetic Circuits: A survey of recent results and open questions
- Randomness conductors and constant-degree lossless expanders
- Modern Coding Theory
- Efficient erasure correcting codes
- Linear-Time Encodable/Decodable Codes With Near-Optimal Rate
- Towards Optimal and Efficient Perfectly Secure Message Transmission
- Scalable Multiparty Computation with Nearly Optimal Work and Resilience
- Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions
- On linear-size pseudorandom generators and hardcore functions
- Distributed fingerprints and secure information dispersal
- Threshold cryptosystems from threshold fully homomorphic encryption
- Linear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applications
- How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
- Blackbox secret sharing revisited: a coding-theoretic approach with application to expansionless near-threshold schemes
- Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields
- Capacity-achieving sequences for the erasure channel
- Linear Threshold Secret-Sharing with Binary Reconstruction
- Verifiable relation sharing and multi-verifier zero-knowledge in two rounds: trading NIZKs with honest majority (extended abstract)
Cited In (1)
This page was built for publication: How to recover a secret with \(O(n)\) additions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6186593)