Leakage Resilient Cheating Detectable Secret Sharing Schemes
From MaRDI portal
Publication:6488373
DOI10.1007/978-3-030-90567-5_1zbMath1522.94101MaRDI QIDQ6488373
Sabyasachi Dutta, Reihaneh Safavi-Naini
Publication date: 13 April 2023
Cryptography (94A60) Theory of compilers and interpreters (68N20) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Unnamed Item
- How to share a secret with cheaters
- Multiple assignment scheme for sharing secret
- Secret sharing schemes with detection of cheaters for a general access structure
- Almost optimum secret sharing schemes with cheating detection for random bit strings
- Improvements to almost optimum secret sharing with cheating detection
- A perfect threshold secret sharing scheme to identify cheaters
- Lower bounds for leakage-resilient secret sharing
- Leakage resilient secret sharing and applications
- Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures
- How to share a function securely
- Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security
- Semantic Security for the Wiretap Channel
- Detection of Algebraic Manipulation in the Presence of Leakage
- Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions
- Detecting Algebraic Manipulation in Leaky Storage Systems
- Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
- Secret-Sharing Schemes: A Survey
- How to share a secret
- Leakage-Resilient Cryptography from the Inner-Product Extractor
- Flaws in Some Secret Sharing Schemes Against Cheating
- Efficient (k,n) Threshold Secret Sharing Schemes Secure Against Cheating from n − 1 Cheaters
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Repairing Reed-Solomon Codes
- Non-malleable secret sharing
- Circuits resilient to additive attacks with applications to secure computation
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
- Optimum Secret Sharing Scheme Secure against Cheating
- Theory of Cryptography
- On the local leakage resilience of linear secret sharing schemes
This page was built for publication: Leakage Resilient Cheating Detectable Secret Sharing Schemes