Continuously non-malleable secret sharing for general access structures
From MaRDI portal
Publication:2175937
DOI10.1007/978-3-030-36033-7_8zbMath1455.94206OpenAlexW2991010855MaRDI QIDQ2175937
Gianluca Brian, Daniele Venturi, Antonio Faonio
Publication date: 30 April 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-36033-7_8
Related Items (8)
Adaptive extractors and their application to leakage resilient secret sharing ⋮ Secret sharing with statistical privacy and computational relaxed non-malleability ⋮ Practical continuously non-malleable randomness encoders in the random oracle model ⋮ Continuously non-malleable secret sharing for general access structures ⋮ Short leakage resilient and non-malleable secret sharing schemes ⋮ Continuously non-malleable secret sharing: joint tampering, plain model and capacity ⋮ Continuously non-malleable codes in the split-state model ⋮ Non-malleable secret sharing against bounded joint-tampering attacks in the plain model
Cites Work
- Unnamed Item
- Unnamed Item
- Continuously non-malleable codes in the split-state model from minimal assumptions
- Non-malleable secret sharing for general access structures
- Lower bounds for leakage-resilient secret sharing
- Non-malleable codes, extractors and secret sharing for interleaved tampering and composition of tampering
- Continuously non-malleable secret sharing for general access structures
- Non-malleable codes for decision trees
- Rate-optimizing compilers for continuously non-malleable codes
- Revisiting non-malleable secret sharing
- Non-malleable secret sharing in the computational setting: adaptive tampering, noisy-leakage resilience, and improved rate
- Leakage resilient secret sharing and applications
- Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures
- Optimal Computational Split-state Non-malleable Codes
- Non-malleable Codes from Two-Source Extractors
- Tamper and Leakage Resilience in the Split-State Model
- Non-malleable Reductions and Applications
- Capacity of non-malleable codes
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing
- Leakage-Resilient Storage
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Non-Malleable Codes
- Improved non-malleable extractors, non-malleable codes and independent source extractors
- Non-malleable secret sharing
- Non-malleable codes from additive combinatorics
- Leakage-Resilient Non-malleable Codes
- Textbook non-malleable commitments
- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
- Continuous Non-malleable Codes
- Continuously non-malleable codes with split-state refresh
This page was built for publication: Continuously non-malleable secret sharing for general access structures