Non-malleable secret sharing against bounded joint-tampering attacks in the plain model
From MaRDI portal
Publication:2102060
DOI10.1007/978-3-030-56877-1_5zbMath1504.94205OpenAlexW3037437399MaRDI QIDQ2102060
Mark Simkin, Antonio Faonio, Gianluca Brian, Daniele Venturi, Maciej Obremski
Publication date: 7 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-56877-1_5
Related Items (7)
Adaptive extractors and their application to leakage resilient secret sharing ⋮ Secret sharing with statistical privacy and computational relaxed non-malleability ⋮ (Nondeterministic) hardness vs. non-malleability ⋮ Short leakage resilient and non-malleable secret sharing schemes ⋮ Continuously non-malleable codes against bounded-depth tampering ⋮ Continuously non-malleable secret sharing: joint tampering, plain model and capacity ⋮ Non-malleable secret sharing against bounded joint-tampering attacks in the plain model
Cites Work
- Unnamed Item
- Unnamed Item
- Continuously non-malleable codes in the split-state model from minimal assumptions
- Non-malleable secret sharing for general access structures
- Inception makes non-malleable codes stronger
- Lower bounds for leakage-resilient secret sharing
- Non-malleable secret sharing against bounded joint-tampering attacks in the plain model
- Continuously non-malleable secret sharing for general access structures
- Rate-optimizing compilers for continuously non-malleable codes
- Continuous non-malleable codes in the 8-split-state model
- Revisiting non-malleable secret sharing
- Non-malleable secret sharing in the computational setting: adaptive tampering, noisy-leakage resilience, and improved rate
- Leakage resilient secret sharing and applications
- Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures
- Optimal Computational Split-state Non-malleable Codes
- Non-malleable Codes from Two-Source Extractors
- Tamper and Leakage Resilience in the Split-State Model
- Non-malleable Reductions and Applications
- Capacity of non-malleable codes
- How to share a secret
- Non-Malleable Codes
- Improved non-malleable extractors, non-malleable codes and independent source extractors
- Non-malleable secret sharing
- Leakage-Resilient Non-malleable Codes
- Non-malleable extractors and codes, with their many tampered extensions
- Continuous Non-malleable Codes
- Continuously non-malleable codes with split-state refresh
This page was built for publication: Non-malleable secret sharing against bounded joint-tampering attacks in the plain model