How to share a secret

From MaRDI portal
Publication:3050283

DOI10.1145/359168.359176zbMath0414.94021OpenAlexW2141420453WikidataQ21588915 ScholiaQ21588915MaRDI QIDQ3050283

Adi Shamir

Publication date: 1979

Published in: Communications of the ACM (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/359168.359176



Related Items

Cryptanalysis and improvement of verifiable quantum \((k,n)\) secret sharing, Construction of authentication codes with double arbiters over symplectic geometry, Combinatorial lower bounds for secret sharing schemes, Lower bounds for robust secret sharing schemes, Secret-sharing schemes for very dense graphs, \(d\)-dimensional quantum state sharing with adversary structure, Robust vector space secret sharing schemes, Efficient quantum secret sharing, A novel group key transfer for big data security, Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares, Quantum ramp secret sharing scheme and quantum operations, Secure multi-party computation protocol for sequencing problem, Secret sharing based on quantum Fourier transform, Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures, A provable secure fuzzy identity based signature scheme, An improved multiparty quantum secret sharing with Bell states and Bell measurement, Threshold quantum cryptograph based on Grover's algorithm, On locally decodable codes, self-correctable codes, and \(t\)-private PIR, The use of mathematical linguistic methods in creating secret sharing threshold algorithms, On \(d\)-multiplicative secret sharing, Admissible tracks in Shamir's scheme, Efficient multi-secret image sharing based on Boolean operations, Distributed certificateless key encapsulation mechanism secure against the adaptive adversary, Privacy and verifiability in voting systems: methods, developments and trends, Paillier-based publicly verifiable (non-interactive) secret sharing, Extremal properties of \(t\)-SEEDs and recursive constructions, New results and applications for multi-secret sharing schemes, Local indistinguishability and possibility of hiding cbits in activable bound entangled states, Secret sharing schemes from binary linear codes, Identity-based threshold decryption on access structure, Visual cryptography on graphs, Asymmetric multi-party quantum state sharing of an arbitrary \(m\)-qubit state, Sharing a quantum secret without a trusted party, On a kind of two-weight code, Efficient symmetric five-party quantum state sharing of an arbitrary \(m\)-qubit state, Conditional e-payments with transferability, Distributed algorithmic mechanism design for scheduling on unrelated machines, Secure message transmission in asynchronous networks, On the uselessness of quantum queries, Ideal multipartite secret sharing schemes, The formulae and algorithms for Lagrange-power basis transformation and Lagrange-Newton transformation, Efficient high-capacity quantum secret sharing with two-photon entanglement, \((2,n)\) secret sharing scheme for gray and color images based on Boolean operation, Leakproof secret sharing protocols with applications to group identification scheme, Verifiable multi-secret sharing based on LFSR sequences, Multiparty quantum secret information sharing in enterprise management based on single qubit with random rotation angle, Asynchronous privacy-preserving iterative computation on peer-to-peer networks, Linear threshold multisecret sharing schemes, Recursive hiding of biometrics-based secret sharing scheme using adversary structure, Verifiable secret sharing in a total of three rounds, Provably secure threshold public-key encryption with adaptive security and short ciphertexts, Asymmetric quantum information splitting of an arbitrary \(N\)-qubit state via GHZ-\textit{like} state and Bell states, Restricted adaptive oblivious transfer, Creation of identity-based digital signature schemes from bilinear maps, Secure hardware implementation of nonlinear functions in the presence of glitches, Side-channel resistant crypto for less than 2,300 GE, Hypergraphs of multiparty secrets, The complexity and randomness of linear multi-secret sharing schemes with non-threshold structures, An ID-based signcryption scheme with compartmented secret sharing for unsigncryption, Quantum simultaneous secret distribution with dense coding by using cluster states, Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures, Multi-party quantum state sharing of an arbitrary multi-qubit state via \(\chi\)-type entangled states, Efficient VSS free of computational assumption, Decentralized polling with respectable participants, Multi-party computation with conversion of secret sharing, A non-entanglement quantum single sign-on protocol, A two-state entanglement based quantum single sign-on protocol, Enhancing data security in ad hoc networks based on multipath routing, Tripartite quantum operation sharing with two asymmetric three-qubit W states in five entanglement structures, Computing on quantum shared secrets for general quantum access structures, General secret sharing based on quantum Fourier transform, Veto is impossible in secret sharing schemes, A novel protocol for multiparty quantum key management, Certificateless threshold signature secure in the standard model, New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structures, Compact sequences of co-primes and their applications to the security of CRT-based threshold schemes, Erdős-Pyber theorem for hypergraphs and secret sharing, Secret sharing with multi-cover adaptive steganography, Efficient verifiable multi-secret sharing scheme based on hash function, A kind of three-weight linear codes, A new secret sharing scheme, Effect of quantum noise on deterministic joint remote state preparation of a qubit state via a GHZ channel, An optimized quantum information splitting scheme with multiple controllers, A full proof of the BGW protocol for perfectly secure multiparty computation, The complexity of the connected graph access structure on seven participants, A case study in almost-perfect security for unconditionally secure communication, Graph state-based quantum secret sharing with the Chinese remainder theorem, A generalized information theoretical model for quantum secret sharing, Sharing the quantum state and the classical information simultaneously, Localised multisecret sharing, Secret sharing schemes for compartmented access structures, Evaluation of the Hamming weights of a class of linear codes based on Gauss sums, Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem, Comments on Harn-Lin's cheating detection scheme, An ideal multi-secret sharing scheme based on MSP, Self-generated-certificate public key encryption without pairing and its application, Efficient certificateless threshold signatures without random oracles, A new threshold authenticated encryption scheme using labor-division signature, A pairing-based publicly verifiable secret sharing scheme, Non-admissible tracks in Shamirs scheme, An inductive construction of minimal codes, Secret sharing schemes based on the dual of Golay codes, Three \((t, n )\)-secret image sharing schemes based on homogeneous linear recursion, ATLAS: efficient and scalable MPC in the honest majority setting, Unconditional communication-efficient MPC via Hall's marriage theorem, Efficient information-theoretic multi-party computation over non-commutative rings, Evolving homomorphic secret sharing for hierarchical access structures, Adaptive extractors and their application to leakage resilient secret sharing, Upslices, downslices, and secret-sharing with complexity of \(1.5^n\), Traceable secret sharing and applications, Quadratic secret sharing and conditional disclosure of secrets, Quantum secret sharing of secure direct communication using one-time pad, Sharing a qudit state by using Bell states channel, Threshold proxy re-signature, Splitting a quantum secret without the assistance of entanglements, Multiple independent quantum states sharing under collaboration of agents in quantum networks, High-dimensional deterministic multiparty quantum secret sharing without unitary operations, A quantum protocol for \((t,n)\)-threshold identity authentication based on Greenberger-Horne-Zeilinger states, Analysis of an unconditionally secure distributed oblivious transfer, Finding lower bounds on the complexity of secret sharing schemes by linear programming, Algebraic geometric codes with applications, Recursive constructions for perfect secret sharing schemes, Fake and dishonest participant location scheme in secret image sharing, Generalized threshold secret sharing and finite geometry, On ideal homomorphic secret sharing schemes and their decomposition, Projective binary linear codes from special Boolean functions, High-dimensional quantum threshold anonymous identity authentication scheme, Quantum secret sharing without monitoring signal disturbance, Processing secure, verifiable and efficient SQL over outsourced database, Quantum secret sharing and Mermin operator, Limited resource semiquantum secret sharing, Verifiable threshold quantum secret sharing with sequential communication, Restricted \((k,n)\)-threshold quantum secret sharing scheme based on local distinguishability of orthogonal multiqudit entangled states, Binding cryptographic keys into biometric data: optimization, Finding the maximal adversary structure from any given access structure, Nearly optimal robust secret sharing, Polynomial expressions of \(p\)-ary auction functions, Exact information ratios for secret sharing on small graphs with girth at least 5, What security can we achieve within 4 rounds?, Secret sharing schemes based on graphical codes, Quantum strongly secure ramp secret sharing, Efficient asynchronous verifiable secret sharing and multiparty computation, A simple primal-dual approximation algorithm for 2-edge-connected spanning subgraphs, A quantum evolving secret sharing scheme, Construction of minimal linear codes from multi-variable functions, Union-intersection-bounded families and their applications, Image inpainting-based behavior image secret sharing, A compressed secret image sharing method with shadow image verification capability, Implementing, and keeping in check, a DSL used in E-learning, A note on secure multiparty computation via higher residue symbols, Information hiding using matroid theory, Separable collusion-secure multimedia codes, Formalisation of Bayesian concealment, A novel secret sharing scheme using multiple share images, On abelian and homomorphic secret sharing schemes, Threshold ECDSA with an offline recovery party, Fair hierarchical secret sharing scheme based on smart contract, Evolving ramp secret sharing with a small gap, Lower bounds for leakage-resilient secret sharing, Threshold schemes from isogeny assumptions, Bandwidth-efficient threshold EC-DSA, Threshold ring signatures: new definitions and post-quantum security, Aggregatable distributed key generation, Order-C secure multiparty computation for highly repetitive circuits, Constant-overhead unconditionally secure multiparty computation over binary fields, A geometric approach to homomorphic secret sharing, Verifiable quantum secret sharing scheme using \(d\)-dimensional GHZ state, A family of linear codes from constant dimension subspace codes, A geometric characterization of minimal codes and their asymptotic performance, Dynamic \((t, n)\) threshold quantum secret sharing based on \(d\)-dimensional Bell state, A new fair multi-secret sharing scheme based on asymmetric bivariate polynomial, Quantum secret sharing using GHZ state qubit positioning and selective qubits strategy with simulation analysis, Security protection using two different image shadows with authentication, Guaranteed output delivery comes free in honest majority MPC, MPC with friends and foes, Efficient compiler to covert security with public verifiability for honest majority MPC, A new \((w, t, n)\)-weighted threshold quantum secret sharing scheme based on two-qubit system, Bandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive security, A cost-effective quantum protocol for secure multi-party multiplication, A verifiable \((k, n)\)-threshold dynamic quantum secret sharing scheme, Quantum verifiable protocol for secure modulo zero-sum randomness, Non-malleability against polynomial tampering, Non-malleable secret sharing against bounded joint-tampering attacks in the plain model, Nearly optimal robust secret sharing against rushing adversaries, Cryptanalysis and improvement of a \((t, n)\) threshold group signature scheme, Multiparty mediated quantum secret sharing protocol, Quantum secret sharing based on quantum information masking, Quantum multi-secret sharing via trap codes and discrete quantum walks, Shorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages, ATSSIA: asynchronous truly-threshold Schnorr signing for inconsistent availability, A new kind of universal and flexible quantum information splitting scheme with multi-coin quantum walks, Quantum secret sharing for a class of special hypergraph access structures, A \((k, n)\)-threshold dynamic quantum secure multiparty multiplication protocol, Verifiable multi-dimensional (t,n) threshold quantum secret sharing based on quantum walk, Password protected secret sharing from lattices, \textsf{CSI-RAShi}: distributed key generation for CSIDH, Multi-party quantum secret sharing protocol based on GHZ states entanglement swapping, Bidirectional quantum transmission with different levels of control, New \((k,l,m)\)-verifiable multi-secret sharing schemes based on XTR public key system, The price of active security in cryptographic protocols, Secure fast evaluation of iterative methods: with an application to secure PageRank, Multi-party revocation in sovrin: performance through distributed trust, A scalable post-quantum hash-based group signature, Secret sharing with statistical privacy and computational relaxed non-malleability, FROST: Flexible round-optimized Schnorr threshold signatures, A secret image sharing method using integer wavelet transform, A novel distributed privacy paradigm for visual sensor networks based on sharing dynamical systems, Partitioned encryption and achieving simultaneity by partitioning, Distributed ring signatures from general dual access structures, Generalised cumulative arrays in secret sharing, A flaw in the use of minimal defining sets for secret sharing schemes, Secret sharing schemes with partial broadcast channels, Reputation management and signature delegation: A distributed approach, How to share a secret with cheaters, Summing over a network without revealing summands, On the power of two-point based sampling, Secret sharing schemes for graph-based prohibited structures, Univariate polynomial factorization over finite fields, A cheating prevention scheme for binary visual cryptography with homogeneous secret images, All inequalities for the relative entropy, Access structures of hyperelliptic secret sharing schemes, A cryptosystem for multiple communication, Proactive quantum secret sharing, Dividing secrets to secure data outsourcing, A note on Master keys for group sharing, Threshold quantum secure direct communication without entanglement, Many-agent controlled teleportation of multi-qubit quantum information, Secret sharing of quantum information via entanglement swapping in cavity QED, On the classification of ideal secret sharing schemes, Sharing secrets in stego images with authentication, Error-correcting codes and cryptography, Distributed user identification by zero-knowledge access rights proving, Two distributed problems involving Byzantine processes, Fully dynamic secret sharing schemes, Collisionful keyed hash functions with selectable collisions, Fair reconstruction of a secret, Password authentication without using a password table, On the information rate of secret sharing schemes, Threshold proxy quantum signature scheme with threshold shared verification, Rearrangements of access structures and their realizations in secret sharing schemes, Visual secret sharing for multiple secrets, Threshold quantum secret sharing between multi-party and multi-party, Lower bounds for monotone span programs, Efficient robust secret sharing from expander graphs, A multisecret sharing scheme for color images based on cellular automata, Protocols for group oriented secret sharing, Incidence structures applied to cryptography, Some improved bounds on the information rate of perfect secret sharing schemes, Strongly ideal secret sharing schemes, Clique vertex magic cover of a graph, A secret sharing scheme with a short share realizing the \((t,n)\) threshold and the adversary structure, Improvements in geometry-based secret image sharing approach with steganography, Biometric methods for secure communications in body sensor networks: resource-efficient key management and signal-level data scrambling, Controlled teleportation of an arbitrary \(n\)-qubit quantum information using quantum secret sharing of classical message, Linear secret sharing schemes and rearrangements of access structures, A secure scheme to share secret color images, Three-level secret sharing schemes from the twisted cubic, Elementary symmetric polynomials in Shamir's scheme, Optimal complexity of secret sharing schemes with four minimal qualified subsets, An efficient multi-use multi-secret sharing scheme based on hash function, Extensions of access structures and their cryptographic applications, A verifiable multi-secret sharing scheme based on cellular automata, Strong \((n, t, n)\) verifiable secret sharing scheme, Symmetric threshold multipath (STM): an online symmetric key management scheme, Attribute-based key-insulated signature and its applications, VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches, Lattice-based treshold-changeability for standard CRT secret-sharing schemes, Linear multi-secret sharing schemes based on multi-party computation, Online data storage using implicit security, Certificateless threshold ring signature, Secret image sharing based on cellular automata and steganography, On proper secrets, \((t,k)\)-bases and linear codes, Preserving worker privacy in crowdsourcing, On expected constant-round protocols for Byzantine agreement, New schemes for sharing points on an elliptic curve, Security and privacy aspects in MapReduce on clouds: a survey, Ideal secret sharing schemes whose minimal qualified subsets have at most three participants, Detection and identification of cheaters in \((t,n)\) secret sharing scheme, Distortion-free secret image sharing mechanism using modulus operator, On the security of a visual cryptography scheme for color images, A quantum single sign-on protocol based on GHZ states, A comment on ``Sharing secrets in stego images with authentication, Multipartite secret sharing by bivariate interpolation, A sharing-based fragile watermarking method for authentication and self-recovery of image tampering, Designing a secure e-tender submission protocol, Hypergraph decomposition and secret sharing, Linear connectivity problems in directed hypergraphs, Quantum state sharing of a single-qubit state via an arbitrary high-dimensional entangled state, Threshold changeable secret sharing schemes revisited, On the optimization of bipartite secret sharing schemes, Generalized scheme for splitting arbitrary 2-qubit state with three 2-qubit entangled states, An impossibility result on graph secret sharing, Multilevel secret sharing schemes arising from the normal rational curve, Reversible data hiding based on Shamir's secret sharing for color images over cloud, Blocked linear secret sharing scheme for scalable attribute based encryption in manageable cloud storage system, Secure multiplication of shared secrets in the exponent, Monotone circuits for monotone weighted threshold functions, Strongly secure ramp secret sharing schemes for general access structures, Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority, The design of a secure and fair sealed-bid auction service, On the bound for anonymous secret sharing schemes, Perfectly secure data aggregation via shifted projections, Some basics on privacy techniques, anonymization and their big data challenges, Higher weights and near-MDR codes over chain rings, The knowledge complexity of quadratic residuosity languages, Ideal ramp schemes and augmented orthogonal arrays, Cutting-edge cryptography through the lens of secret sharing, Algorithmic problems in right-angled Artin groups: complexity and applications, On the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rate, On dynamic threshold schemes, Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model, ZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher calls, Some democratic secret sharing schemes, Privacy-preserving distributed mining of association rules using elliptic-curve cryptosystem and Shamir's secret sharing scheme, On the information rate of perfect secret sharing schemes, Multiparty quantum direct secret sharing of classical information with Bell states and Bell measurements, A note on dynamic threshold schemes, Analysis of secret sharing schemes based on Nielsen transformations, Towards breaking the exponential barrier for general secret sharing, Improving the linear programming technique in the search for lower bounds in secret sharing, Anonymous secret sharing schemes, Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes, Mathematical problems in cryptology, An efficient construction of perfect secret sharing schemes for graph-based structures, A secure ciphertext self-destruction scheme with attribute-based encryption, A reversible steganography scheme of secret image sharing based on cellular automata and least significant bits construction, Finite set theory and its application to cryptology, Linear codes from simplicial complexes, Distributive weighted threshold secret sharing schemes, Effect of noise on deterministic joint remote preparation of an arbitrary two-qubit state, Secure two-party computation via cut-and-choose oblivious transfer, Graph coloring applied to secure computation in non-abelian groups, On minimal connectivity requirements for secure message transmission in directed networks, Ideal ramp schemes and related combinatorial objects, On the information ratio of non-perfect secret sharing schemes, Optimal codes from Fibonacci polynomials and secret sharing schemes, Timed-release computational secret sharing and threshold encryption, Combinatorial repairability for threshold schemes, Sharing one secret vs. sharing many secrets., On identification secret sharing schemes., Relative generalized Hamming weights of cyclic codes, Quantum secret sharing using orthogonal multiqudit entangled states, Unitary reconstruction of secret for stabilizer-based quantum secret sharing, Privacy-preserving outsourcing of image feature extraction in cloud computing, Multi-party key agreement protocols with cheater identification, A new improving quantum secret sharing scheme, Homomorphic secret sharing for low degree polynomials, Constructing ideal secret sharing schemes based on Chinese remainder theorem, Efficient identity-based threshold decryption scheme from bilinear pairings, Privacy preserving distributed optimization using homomorphic encryption, Information flow on trees, Strongly secure quantum ramp secret sharing constructed from algebraic curves over finite fields, Optimal information ratio of secret sharing schemes on Dutch windmill graphs, Linear codes from weakly regular plateaued functions and their secret sharing schemes, Non-zero-sum cooperative access control game model with user trust and permission risk, Perennial secure multi-party computation of universal Turing machine, On smooth orthogonal and octilinear drawings: relations, complexity and Kandinsky drawings, Multi-dimensional quantum state sharing based on quantum Fourier transform, Threshold quantum secret sharing based on single qubit, Attacks to some verifiable multi-secret sharing schemes and two improved schemes, Multi-prover proof of retrievability, An explication of secret sharing schemes, Improvement of assurance including security for wireless sensor networks using dispersed data transmission, Multiple assignment scheme for sharing secret, Threshold undeniable signature scheme based on conic, New secret sharing scheme based on linear code, Improvement of Tseng et al.'s authenticated encryption scheme with message linkages, Secret sharing schemes with three or four minimal qualified subsets, An improvement on the Lin-Wu \((t,n)\) threshold verifiable multi-secret sharing scheme, Reduced access structures with four minimal qualified subsets on six participants, Secret image sharing scheme with threshold changeable capability, Efficient and secure outsourced approximate pattern matching protocol, On 2-level secret sharing, A perfect threshold secret sharing scheme to identify cheaters, How to avoid the cheaters succeeding in the key sharing scheme, Secret sharing over infinite domains, A ramp model for distributed key distribution schemes, Generation of key predistribution schemes using secret sharing schemes, Randomness in secret sharing and visual cryptography schemes, A \((t,n)\) multi-secret sharing scheme, Threshold verification scheme to a valid-signature using identity only on specialized approval, Shared generation of pseudo-random functions, Kirkman packing designs KPD(\(\{w,s^{\ast}\},v \)) and related threshold schemes, Ideal homomorphic secret sharing schemes over cyclic groups, Secure distributed storage and retrieval, The bank safe problem, Protecting data privacy in private information retrieval schemes, New efficient and secure protocols for verifiable signature sharing and other applications, Secret-sharing with a class of ternary codes, Graph decompositions and secret sharing schemes, Lower bounds on the information rate of secret sharing schemes with homogeneous access structure., Adaptively secure distributed public-key systems., A combinatorial characterization of regular anonymous perfect threshold schemes, Robust threshold DSS signatures, On the size of shares for secret sharing schemes, Vertex-disjoint spanning trees of the star network with applications to fault-tolerance and security, Probability of shares in secret sharing schemes, Geometric secret sharing schemes and their duals, Weighted decomposition construction for perfect secret sharing schemes, On the structure of the privacy hierarchy, An efficient verifiable quantum secret sharing scheme via quantum walk teleportation, Discrete modulation continuous variable quantum secret sharing, New classes of binary few weight codes from trace codes over a chain ring, Two-weight and three-weight linear codes constructed from Weil sums, Efficient noise generation to achieve differential privacy with applications to secure multiparty computation, \((t,n)\) Threshold quantum secret sharing using rotation operation, Implementing secure reporting of sexual misconduct -- revisiting WhoToo, Improved threshold signatures, proactive secret sharing, and input certification from LSS isomorphisms, The cost of IEEE arithmetic in secure computation, High-threshold AVSS with optimal communication complexity, Versatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract), Polynomial representation is tricky: maliciously secure private set intersection revisited, Function-private conditional disclosure of secrets and multi-evaluation threshold distributed point functions, Adaptively secure threshold symmetric-key encryption, Constructive \(t\)-secure homomorphic secret sharing for low degree polynomials, Perfectly-secure asynchronous MPC for general adversaries (extended abstract), Improving the efficiency of optimally-resilient statistically-secure asynchronous multi-party computation, High throughput secure MPC over small population in hybrid networks (extended abstract), Randomized component based secure secret reconstruction in insecure networks, Quantum signature scheme based on secret sharing, ZK-PCPs from leakage-resilient secret sharing, A collaborative secret sharing scheme based on the Chinese remainder theorem, Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems, Ramp secret image sharing, Reducing file size and time complexity in secret sharing based document protection, A non-interactive \((t, n)\)-publicly verifiable multi-secret sharing scheme, Two quantum secret sharing schemes with adversary structure, Quantum \((t,n)\) threshold proxy blind signature scheme based on Bell states, The \(\varepsilon\)-\(t\)-net problem, Multi-rate threshold FlipThem, Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databases, Monitorable hyperproperties of nonterminating systems, Abelian sharing, common informations, and linear rank inequalities, Constructions of projective linear codes by the intersection and difference of sets, Stacking sigmas: a framework to compose \(\varSigma\)-protocols for disjunctions, Algebraic geometric secret sharing schemes over large fields are asymptotically threshold, A group identification protocol with leakage resilience of secret sharing scheme, Ramp secret sharing with cheater identification in presence of rushing cheaters, A blind coupon mechanism enabling veto voting over unreliable networks, Five-partite continuous-variable quantum state sharing, Authenticated controlled quantum secure direct communication protocol based on five-particle Brown states, Generalization of IPP codes and IPP set systems, Traceability codes and their generalizations, Source-location privacy full protection in wireless sensor networks, Cheating identifiable secret sharing scheme using symmetric bivariate polynomial, Quantum secret sharing based on continuous-variable GHZ states, Homomorphic extensions of CRT-based secret sharing, On non-binary traceability set systems, Message randomization and strong security in quantum stabilizer-based secret sharing for classical secrets, A new threshold changeable secret sharing scheme based on the Chinese remainder theorem, Selected application of the Chinese remainder theorem in multiparty computation, A family of distance-optimal minimal linear codes with flexible parameters, Security analysis of a dynamic threshold secret sharing scheme using linear subspace method, Strong security of linear ramp secret sharing schemes with general access structures, Confidential gossip, \(1/p\)-secure multiparty computation without an honest majority and the best of both worlds, A fully dynamic secret sharing scheme, On the universal steganography of optimal rate, A verifiable threshold secret sharing scheme based on lattices, Secret sharing schemes for infinite sets of participants: a new design technique, Communication-efficient proactive secret sharing for dynamic groups with dishonest majorities, Improved building blocks for secure multi-party computation based on secret sharing with honest majority, The economics of data externalities, On the information ratio of graphs without high-degree neighbors, Public key encryption with filtered equality test revisited, Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification, On group-characterizability of homomorphic secret sharing schemes, PC-SyncBB: a privacy preserving collusion secure DCOP algorithm, Efficient verifiable quantum secret sharing schemes via eight-quantum-entangled states, Authenticable quantum scheme for secret sharing based on local distinguishability, Secret sharing based multiparty quantum computation for multiplication, Asynchronous Byzantine agreement with optimal resilience, Leakage-resilient coin tossing, Admissible tracks in Lai-Ding's secret sharing scheme, Extending Brickell-Davenport theorem to non-perfect secret sharing schemes, Optimal assignment schemes for general access structures based on linear programming, Multiparty quantum secret splitting and quantum state sharing, Symmetric and probabilistic quantum state sharing via positive operator-valued measure, Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism, Sharing a verifiable secret image using two shadows, Visual secret sharing by random grids revisited, Tightly coupled multi-group threshold secret sharing based on Chinese remainder theorem, A new construction of threshold cryptosystems based on RSA, Realizing secret sharing with general access structure, Threshold changeable secret sharing with secure secret reconstruction, A linear code based on resilient Boolean maps whose dual is a platform for a robust secret sharing scheme, New generalized secret-sharing schemes with points on a hyperplane using a Wronskian matrix, New classes of \(p\)-ary few weight codes, On black-box complexity of universally composable security in the CRS model, Formalisation of probabilistic concealment, Hierarchical quantum information splitting of an arbitrary two-qubit using a single quantum resource, Limited resource semi-quantum secret sharing based on multi-level systems, A multi-party quantum key agreement protocol based on Shamir's secret sharing, Verifiable quantum secret sharing protocols based on four-qubit entangled states, A secret sharing scheme for quantum gray and color images based on encryption, Accumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computation, Cooperative secret sharing using QR codes and symmetric keys, Chinese remainder theorem-based secret image sharing with small-sized shadow images, Efficient explicit constructions of compartmented secret sharing schemes, An information theoretically secure e-lottery scheme based on symmetric bivariate polynomials, Secret sharing based on a hard-on-average problem, Two secret sharing schemes based on Boolean operations, Three classes of linear codes with two or three weights, A Latin square autotopism secret sharing scheme, Orthogonal matrix and its application in Bloom's threshold scheme, Optimal linear secret sharing schemes for graph access structures on six participants, On the evaluation codes given by simple \(\delta \)-sequences, On insecurity of Naor-Pinkas' distributed oblivious transfer, Computing in social networks, Delegation with supervision, Threshold cryptography based on Asmuth-Bloom secret sharing, An efficient quantum secret sharing protocol with orthogonal product states, Improving the round complexity of VSS in point-to-point networks, Prêt à voter with Paillier encryption, On ASGS framework: general requirements and an example of implementation, On an infinite family of graphs with information ratio \(2 - 1/k\), Step-out group signatures, Cheating-immune secret sharing schemes from codes and cumulative arrays, Secret sharing schemes based on additive codes over \(\mathrm{GF}(4)\), Secret-sharing for NP, New multi-stage secret sharing in the standard model, On the weight distribution of some minimal codes, Secure multi-party computation in large networks, Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption, Binary linear codes from vectorial Boolean functions and their weight distribution, Secret sharing with secure secret reconstruction, Enabling cloud storage auditing with key-exposure resilience under continual key-leakage, Local distinguishability of Dicke states in quantum secret sharing, A construction of \(q\)-ary linear codes with two weights, Secure and efficient outsourcing computation on large-scale linear regressions, Privacy-preserving distributed deep learning based on secret sharing, Hardware security without secure hardware: how to decrypt with a password and a server, Cryptographic algorithms for privacy-preserving online applications, A formal treatment of the role of verified compilers in secure computation, Fair quantum secret sharing based on symmetric bivariate polynomial, Quantum secret sharing using the \(d\)-dimensional GHZ state, Dynamic quantum secret sharing by using \(d\)-dimensional GHZ state, A survey and refinement of repairable threshold schemes, Post-quantum online voting scheme, Towards self-stabilizing blockchain, reconstructing totally erased blockchain, Identity-based encryption with hierarchical key-insulation in the standard model, Local bounds for the optimal information ratio of secret sharing schemes, Semi-quantum cryptography, Classical access structures of ramp secret sharing based on quantum stabilizer codes, A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security, Implementation of quantum secret sharing and quantum binary voting protocol in the IBM quantum computer, Quantum \((t, n)\) threshold group signature based on Bell state, Efficient quantum secret sharing without a trusted player, Threshold secret sharing scheme of quantum images based on least significant bit theory, A secure and efficient on-line/off-line group key distribution protocol, Dynamic and verifiable secret sharing among weighted participants, Utility dependence in correct and fair rational secret sharing, Verifiable quantum \((k,n)\)-threshold secret key sharing, Expansible quantum secret sharing network, Signcryption schemes with threshold unsigncryption, and applications, The optimal linear secret sharing scheme for any given access structure, Secure message transmission on directed networks, Methods of encrypting monotonic access structures, A remark on hierarchical threshold secret sharing, Single sign-on under quantum cryptography, Sharing many secrets with computational provable security, Efficient integer span program for hierarchical threshold access structure, Long term confidentiality: a survey, Cheating detectable threshold scheme against most powerful cheaters for long secrets, Multilevel threshold secret sharing based on the Chinese remainder theorem, A note on ramp secret sharing schemes from error-correcting codes, Quantum secret sharing for general access structures based on multiparticle entanglements, Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes, Secure distributed constraint satisfaction: reaching agreement without revealing private information, Certificateless threshold cryptosystem secure against chosen-ciphertext attack, Towards a theory of data entanglement, New \((t, n)\) threshold directed signature scheme with provable security, Bidirectional quantum secret sharing and secret splitting with polarized single photons, An efficient quantum secret sharing scheme with Einstein-Podolsky-Rosen pairs, New efficient and practical verifiable multi-secret sharing schemes, General constructions for information-theoretic private information retrieval, A scheme for threshold multi-secret sharing, A general approach to robust web metering, Properties and constraints of cheating-immune secret sharing schemes, Secret sharing schemes on access structures with intersection number equal to one, A dynamic threshold commercial key escrow scheme based on conic, Cheating in visual cryptography, A fuzzy vault scheme, Sharing multiple secrets: Models, schemes and analysis, Protecting against key-exposure: strongly key-insulated encryption with optimal threshold, Provably secure threshold password-authenticated key exchange, The exact values of the optimal average information ratio of perfect secret-sharing schemes for tree-based access structures, Protocols for multiparty coin toss with a dishonest majority, A new \((t,n)\) multi-secret sharing scheme based on Shamir's secret sharing, Identity based group-oriented undeniable signature scheme, A new efficient \((t,n)\) verifiable multi-secret sharing (VMSS) based on YCH scheme, Distributing the encryption and decryption of a block cipher, A rational threshold signature model and protocol based on different permissions, A secret sharing scheme based on cellular automata, Roughly weighted hierarchical simple games, Sharing DSS by the Chinese remainder theorem, A four-state entanglement based quantum single sign-on protocol, Dynamic threshold secret reconstruction and its application to the threshold cryptography, Practical (fully) distributed signatures provably secure in the standard model, Scalable mechanisms for rational secret sharing, On constructing 1-cheating immune secret-sharing functions, One-time rational secret sharing scheme based on bayesian game, Secure Computation, I/O-Efficient Algorithms and Distributed Signatures, SECURE QUANTUM CARRIERS FOR QUANTUM STATE SHARING, SECRET IMAGE SHARING BASED ON CHAOTIC MAP AND CHINESE REMAINDER THEOREM, A SIMPLE AND SECURE QUANTUM SECRET SHARING SCHEME BASED ON PRODUCT STATES, Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability, Complementing Feistel Ciphers, Higher-Order Glitch Resistant Implementation of the PRESENT S-Box, Timed-Release Secret Sharing Schemes with Information Theoretic Security, Practical Sharing of Quantum Secrets over Untrusted Channels, Round-Optimal Perfectly Secret Message Transmission with Linear Communication Complexity, Leakage Resilience of the Blom’s Key Distribution Scheme, Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice, Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions, Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters, Dynamic and Verifiable Hierarchical Secret Sharing, Revisiting the False Acceptance Rate Attack on Biometric Visual Cryptographic Schemes, Detecting Algebraic Manipulation in Leaky Storage Systems, A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress), Quantum multiparty cryptosystems based on a homomorphic random basis encryption, A verifiable \((t, n)\) threshold quantum state sharing scheme on IBM quantum cloud platform, Ideal access structures based on a class of minimal linear codes, Deterministic tripartite sharing of an arbitrary single-qubit operation with the five-qubit cluster state in a given entanglement structure, Analysis of efficient and secure dynamic quantum secret sharing protocol based on Bell states, Genuine secret-sharing states, A novel three-party quantum secret sharing scheme based on Bell state sequential measurements with application in quantum image sharing, Searching for optimal quantum secret sharing scheme based on local distinguishability, Continuous-variable \((3, 3)\)-threshold quantum secret sharing based on one-sided device-independent security, Quantum grayscale image encryption and secret sharing schemes based on Rubik's cube, A \((w, t, n)\)-weighted threshold dynamic quantum secret sharing scheme with cheating identification, General quantum secret sharing scheme based on two qudit, Secret-shared RAM indefinite private and secure RAM execution of perfectly unrevealed programs, A novel dynamic quantum secret sharing in high-dimensional quantum system, An efficient semi-quantum secret sharing protocol of specific bits, Circuit amortization friendly encodingsand their application to statistically secure multiparty computation, Efficient fully secure computation via distributed zero-knowledge proofs, ALBATROSS: publicly AttestabLe BATched Randomness based On Secret Sharing, Weight distributions of Q2DC codes over finite fields, Meaningful secret image sharing for JPEG images with arbitrary quality factors, Rational quantum secret sharing scheme based on GHZ state, On actively-secure elementary MPC reductions, Ideal hierarchical secret sharing and lattice path matroids, An efficient threshold access-structure for RLWE-based multiparty homomorphic encryption, On the communication efficiency of statistically secure asynchronous MPC with optimal resilience, On communication models and best-achievable security in two-round MPC, Generalized pseudorandom secret sharing and efficient straggler-resilient secure computation, Continuously non-malleable secret sharing: joint tampering, plain model and capacity, Key exposure resistant group key agreement protocol, Ramp scheme based on CRT for polynomial ring over finite field, Self-stabilizing and private distributed shared atomic memory in seldomly fair message passing networks, On secret sharing protocols, A verifiable secret sharing scheme using non-abelian groups, Two new classes of projective two-weight linear codes, Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures, Secret sharing on regular bipartite access structures, Parallel Signcryption, Secret-Sharing Schemes: A Survey, Ideal Secret Sharing Schemes for Useful Multipartite Access Structures, GENERALIZED QUANTUM TWO-QUBIT STATE SHARING VIA POSITIVE OPERATOR-VALUED MEASURE, Secure Outsourced Computation, Hadamard Matrices, Designs and Their Secret-Sharing Schemes, Several Generalizations of Shamir's Secret Sharing Scheme, A new password authentication mechanism based on two phases encryption, How to share a secret, Internet Voting Protocol Based on Improved Implicit Security, On secret sharing schemes, matroids and polymatroids, Efficient Leakage Resilient Circuit Compilers, Threshold Secret Sharing Through Multivariate Birkhoff Interpolation, Communication-Optimal Proactive Secret Sharing for Dynamic Groups, EFFICIENT ID-BASED MULTI-RECEIVER THRESHOLD DECRYPTION, Information-Theoretic Local Non-malleable Codes and Their Applications, How to Avoid Obfuscation Using Witness PRFs, Cutting-Edge Cryptography Through the Lens of Secret Sharing, What is the Future of Cryptography?, Polynomial Evaluation and Side Channel Analysis, Lattice-based identity-based resplittable threshold public key encryption scheme, Private Information Retrieval with Preprocessing Based on the Approximate GCD Problem, The Latin squares and the secret sharing schemes, Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing, Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security, The Functional Dependence Relation on Hypergraphs of Secrets, Fully Distributed Broadcast Encryption, Generic Constant-Round Oblivious Sorting Algorithm for MPC, Leakage-Resilient Coin Tossing, High-Precision Secure Computation of Satellite Collision Probabilities, Secret Sharing Schemes for Dense Forbidden Graphs, Proactive Secret Sharing with a Dishonest Majority, Secure Protocol Transformations, Bounded Indistinguishability and the Complexity of Recovering Secrets, Finite Fields, Gröbner Bases and Modular Secret Sharing, Efficient Threshold Encryption from Lossy Trapdoor Functions, Secret Sharing Schemes from Linear Codes overFp + vFp, Publicly Verifiable Secret Sharing for Cloud-Based Key Management, Secure Message Transmission in Asynchronous Directed Graphs, On Dynamic Distribution of Private Keys over MANETs, Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts, FLEXIBLE DETERMINISTIC JOINT REMOTE STATE PREPARATION OF SOME STATES, Generalized Mignotte's Sequences Over Polynomial Rings, General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting, Ideal secret sharing schemes on graph-based $3$-homogeneous access structures, A NEW SECRET SHARING SCHEME ADVERSARY FUZZY STRUCTURE BASED ON AUTOMATA, A TACOMA retrospective, Efficient and robust two-party RSA key generation, Signcryption-based key management for MANETs applications in mobile commerce, An efficient and secure multi-secret sharing scheme with general access structures, A threshold scheme under peer-to-peer network, Bounds And Constructions For Threshold Shared Generation Of Authenticators, Dynamic vector space secret sharing based on certificates, A trust scheme based DRM model for P2P system, Computationally Secure Robust Multi-secret Sharing for General Access Structure, Hierarchical Visual Secret Sharing Scheme Using Steganography, AN EFFICIENT AND INFORMATION THEORETICALLY SECURE RATIONAL SECRET SHARING SCHEME BASED ON SYMMETRIC BIVARIATE POLYNOMIALS, Perfect secret sharing scheme based on vertex domination set, Weaknesses in Some Threshold Cryptosystems, Robust and Efficient Sharing of RSA Functions, An asymptotically perfect secret sharing scheme based on the Chinese Remainder Theorem, (t,n) THRESHOLD-MULTISIGNATURE SCHEME AND GENERALIZED-MULTISIGNATURE SCHEME WHERE SUSPECTED FORGERY IMPLIES TRACEABILITY OF ADVERSARIAL SHAREHOLDERS, New Protocols and Lower Bounds for Quantum Secret Sharing with Graph States, Perfectly Secure Message Transmission in Two Rounds, Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious, Secret Sharing for mNP: Completeness Results, Round-Optimal Black-Box Two-Party Computation, Threshold Secret Sharing Requires a Linear Size Alphabet, How to Share a Secret, Infinitely, Secret Sharing Schemes with Algebraic Properties and Applications, Recent Advances in Non-perfect Secret Sharing Schemes, A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation, How to Share Secrets: The Idea of Geometric Threshold Games, Fast and Simple Modular Interpolation Using Factorial Representation, Saints and Scoundrels and Two Theorems That Are Really the Same, Secure Protocols with Asymmetric Trust, SECRET SHARING OF N-ATOM ENTANGLED STATE IN CAVITY QED, SHARING SECRETS USING ELEMENTARY CELLULAR AUTOMATA, Unnamed Item, CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts, Practical Threshold Signatures Without Random Oracles, Robust Threshold Schemes Based on the Chinese Remainder Theorem, Error-Tolerant Combiners for Oblivious Primitives, Geometric and Computational Approach to Classical and Quantum Secret Sharing, MULTIPARTY QUANTUM SECRET SHARING SCHEME OF CLASSICAL MESSAGES BY SWAPPING QUDIT-STATE ENTANGLEMENT, A New Efficient Threshold Ring Signature Scheme Based on Coding Theory, Foundations of Homomorphic Secret Sharing, Privacy Preserving Data Mining within Anonymous Credential Systems, On Linear Secret Sharing for Connectivity in Directed Graphs, An RSA-Based (t,n) Threshold Proxy Signature Scheme without Any Trusted Combiner, A New (k,n)-Threshold Secret Sharing Scheme and Its Extension, Wiretapping Based on Node Corruption over Secure Network Coding: Analysis and Optimization, Characterization of some minimal codes for secret sharing, Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption, Practical, Dynamic and Efficient Integrity Verification for Symmetric Searchable Encryption, Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing, Threshold Changeable Ramp Secret Sharing, A t-out-of-n Redactable Signature Scheme, Realistic versus Rational Secret Sharing, Operations over Linear Secret Sharing Schemes, Perfectly Secure Message Transmission Against Independent Rational Adversaries, An algebra to represent security policies for cryptography-based secure storage systems, Linear algebra approach to secret sharing schemes, Probabilistic secret sharing, Secure Multi-party Computation: Information Flow of Outputs and Game Theory, A Distributed Data Storage Scheme for Sensor Networks, Graph states for quantum secret sharing, AN EFFICIENT QUANTUM SECRET SHARING SCHEME WITH DECOY STATES, A NOTE ON SOME QUANTUM SECRET SHARING SCHEMES, Cryptanalysis of Secure Message Transmission Protocols with Feedback, Fully Secure Threshold Unsigncryption, Two phases encryption and its applications, Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures, A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting, SECURE AND PROGRESSIVE IMAGE TRANSMISSION THROUGH SHADOWS GENERATED BY MULTIWAVELET TRANSFORM, Fast fault-tolerant parallel communication and on-line maintenance for hypercubes using information dispersal, Unnamed Item, Unnamed Item, TRIPARTITION OF ARBITRARY SINGLE-QUBIT QUANTUM INFORMATION BY USING ASYMMETRIC FOUR-QUBIT W STATE, Constant-Rounds, Almost-Linear Bit-Decomposition of Secret Shared Values, Resettably Secure Computation, A Cluster-Based Key Establishment Protocol for Wireless Mobile Ad Hoc Networks, Схема разделения секрета типа схемы Блэкли, основанная на пересечении подпространств, An LWE-based verifiable threshold secret sharing scheme, A (2, n)-SECRET SHARING SCHEME BASED ON LINEAR CELLULAR AUTOMATA, Threshold Schemes Based on Criss-Cross Block Designs, Reducing the Complexity in the Distributed Computation of Private RSA Keys, Fair Threshold Decryption with Semi-Trusted Third Parties, Strengthening the Security of Distributed Oblivious Transfer, Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme, Practical Threshold Signatures with Linear Secret Sharing Schemes, A designated verifier signature using secret sharing technique, THRESHOLD MULTIPARTY QUANTUM-INFORMATION SPLITTING VIA QUANTUM CHANNEL ENCRYPTION, Public Verifiability from Pairings in Secret Sharing Schemes, REEXAMINING THE SECURITY OF THE RECONSTRUCTION PHASE OF THE HILLERY-BUZĚK-BERTHIAUME QUANTUM SECRET-SHARING PROTOCOL, Efficient, Robust and Constant-Round Distributed RSA Key Generation, Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems, Ideal Hierarchical Secret Sharing Schemes, Efficient Rational Secret Sharing in Standard Communication Networks, Unnamed Item, On-line secret sharing, The accessibility of an access structure, Computation of the Reconstruction Probability of Secret Sharing Schemes based on the K-terminal Reliability, Randomness in distribution protocols, Private disclosure with multiple agents, Authenticable quantum multi-secret sharing scheme based on monotone span program, Dynamic hierarchical quantum secret sharing with general access structure, On Hamming distance distributions of repeated-root constacyclic codes of length \(3p^s\) over \(\mathbb{F}_{p^m} + u \mathbb{F}_{p^m}\), PAPR: publicly auditable privacy revocation for anonymous credentials, One round threshold ECDSA without roll call, Multiparty verification in image secret sharing, From Farfalle to \textsc{Megafono} via Ciminion: the PRF \textsc{Hydra} for MPC applications, Threshold and multi-signature schemes from linear hash functions, Interpolation for Brill–Noether curves, Access structures determined by uniform polymatroids, Provably unforgeable threshold EdDSA with an offline participant and trustless setup, Ideal dynamic threshold multi-secret data sharing in smart environments for sustainable cities, Short leakage resilient and non-malleable secret sharing schemes, Full threshold change range of threshold changeable secret sharing, A \(d\)-level quantum secret sharing scheme with cheat-detection \((t, m)\) threshold, Efficient Dynamic-Resharing “Verifiable Secret Sharing” against mobile adversary, Secret Sharing Schemes for (k, n)-Consecutive Access Structures, Octanary linear codes using simplicial complexes, Function-Dependent Commitments for Verifiable Multi-party Computation, \(\log^\ast\)-round game-theoretically-fair leader election, Almost-optimally fair multiparty coin-tossing with nearly three-quarters malicious, Quantum-resistant password-based threshold single-sign-on authentication with updatable server private key, Revisiting the efficiency of asynchronous MPC with optimal resilience against general adversaries, MPClan: protocol suite for privacy-conscious computations, Sharing transformation and dishonest majority MPC with packed secret sharing, An efficient publicly verifiable and proactive secret sharing scheme, Minimal codewords arising from the incidence of points and hyperplanes in projective spaces, On ideal and weakly-ideal access structures, Encapsulated search index: public-key, sub-linear, distributed, and delegatable, KDM security for the Fujisaki-Okamoto transformations in the QROM, On secret sharing, randomness, and random-less reductions for secret sharing, Leakage-resilient linear secret-sharing against arbitrary bounded-size leakage family, A perfect secret sharing scheme for general access structures, Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext, Bipartite secret sharing and staircases, Revisiting group oriented secret sharing schemes, Enhancing privacy preservation and trustworthiness for decentralized federated learning, Black-box anonymous commit-and-prove, Multi-client functional encryption with fine-grained access control, A novel quantum private set intersection scheme with a semi-honest third party, Actively revealing card attack on card-based protocols, Efficient Mediated Quantum Secret Sharing Protocol in a Restricted Quantum Environment, Verifiable quantum secret sharing scheme based on LDPC codes, Individual cryptography, \textsf{CSI-Otter}: isogeny-based (partially) blind signatures from the class group action with a twist, Homomorphic secret sharing for multipartite and general adversary structures supporting parallel evaluation of low-degree polynomials, Building blocks of sharding blockchain systems: concepts, approaches, and open problems, Privacy preserving solution of DCOPs by mediation, A verifiable \((k,n)\)-threshold quantum secure multiparty summation protocol, Inversion of Mutually Orthogonal Cellular Automata, A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion, Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness, A survey on functional encryption, A \((t, n)\) Threshold quantum secret sharing scheme with fairness, Better than advertised security for non-interactive threshold signatures, On actively secure fine-grained access structures from isogeny assumptions, Revisiting the efficiency of perfectly secure asynchronous multi-party computation against general adversaries, Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain, Dynamic quantum secret sharing between multiparty and multiparty based on single photons, Private evaluation of a decision tree based on secret sharing, Three systems for shared generation of authenticators, Optimal secret share distribution in degree splitting communication networks, Quantum secret sharing with identity authentication based on GHZ states entanglement swapping, New bounds on the local leakage resilience of Shamir's secret sharing scheme, How to recover a secret with \(O(n)\) additions, Cryptography with weights: MPC, encryption and signatures, Best of both worlds. Revisiting the spymasters double agent problem, Secure multiparty computation from threshold encryption based on class groups, Fully adaptive Schnorr threshold signatures, Snowblind: a threshold blind signature in pairing-free groups, Towards cheat-preventing in block-based progressive visual cryptography for general access structures, Bivariate polynomial-based secret sharing schemes with secure secret reconstruction, HRA-secure attribute-based threshold proxy re-encryption from lattices, Ideal uniform multipartite secret sharing schemes, \(\mathrm{mR}_{\mathrm{LWE}}\)-CP-ABE: a revocable CP-ABE for post-quantum cryptography, A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations, Fast large-scale honest-majority MPC for malicious adversaries, Actively secure garbled circuits with constant communication overhead in the plain model, Beyond honest majority: the round complexity of fair and robust multi-party computation, Efficient secure multiparty computation of sparse vector dot products, Unextendible product operator basis, Bayesian mechanism for rational secret sharing scheme, Memory leakage-resilient secret sharing schemes, HIBE: Hierarchical Identity-Based Encryption, Cheating-Tolerant and Threshold-Based Secure Information Exchange Among Propinquity of Adversaries, MANY-AGENT CONTROLLED MULTI-PLAYER QUANTUM SECRET SHARING SCHEME, Similarity Based Interactive Private Information Retrieval, CRYPTANALYSIS OF THE QUANTUM STATE SHARING PROTOCOL USING FOUR SETS OF W-CLASS STATES, Unnamed Item, Quantum state sharing of an arbitrarym-particle state using Einstein–Podolsky–Rosen pairs and application in quantum voting, A Survey on some Applications of Graph Theory in Cryptography, Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curves, Steganography based image sharing with reversibility, Boolean operations-based visual secret sharing for general access structures, Storing and Retrieving Secrets on a Blockchain, Privacy-Preserving Support Vector Machines with Flexible Deployment and Error Correction, Secret sharing schemes with strong multiplication and a large number of players from toric varieties, Compressed $$\varSigma $$-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures, Approximation and decomposition in lattices of clutters, Constructions of linear codes with two or three weights from vectorial dual-bent functions, Decentralized continuous-variable quantum secret sharing, Quantum attribute-based encryption: a comprehensive study, A study for security of visual cryptography, \textsc{SuperPack}: dishonest majority MPC with constant online communication, Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin, PFLM: privacy-preserving federated learning with membership proof, On homomorphic secret sharing from polynomial-modulus LWE, Quantum secret sharing protocol using GHZ state: implementation on IBM qiskit, An asymmetric dynamic multiparty quantum secret sharing against active attacks, Quantum secret sharing with identity authentication based on Bell states, Two single-state semi-quantum secure direct communication protocols based on single photons, A Hybrid Threshold Group Signature Scheme with Distinguished Signing Authority, Effect of noise on joint remote preparation of multi-qubit state, Econometrics with Privacy Preservation, Cryptography and cryptographic protocols, Key Management in Sensor Networks, Two schemes of multiparty quantum direct secret sharing via a six-particle GHZ state, The lower bound and exact value of the information rate of some developed graph access structures, RATIONAL MULTI-SECRET SHARING SCHEME IN STANDARD POINT-TO-POINT COMMUNICATION NETWORKS, An Algebraic Approach to Nonmalleability, Construction of arithmetic secret sharing schemes by using torsion limits, Multisecret-sharing schemes and bounded distance decoding of linear codes, Pollard's rho attack on ECDLP and Threshold Schemes, Attribute-based key-insulated signature for boolean formula, Gruppen secret sharing or how to share several secrets if you must?, Algorithmic problems in Engel groups and cryptographic applications, Unnamed Item, Unnamed Item, On the Construction of (n, k)-schemes of Visual Cryptography Using a Class of Linear Hash Functions Over a Binary Field, Efficient Simultaneous Broadcast, Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time, Matroids Can Be Far from Ideal Secret Sharing, Cryptography and Game Theory: Designing Protocols for Exchanging Information, SuperTrust – A Secure and Efficient Framework for Handling Trust in Super Peer Networks, On the local leakage resilience of linear secret sharing schemes, An efficient multi-round anonymous auction protocol, From fairness to full security in multiparty computation, Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks, Dynamic quantum secret sharing, Verifiable \((t,n)\) threshold quantum secret sharing using \(d\)-dimensional Bell state, Efficient and Decentralized Polling Protocol for General Social Networks, Secret Swarm Unit Reactive k −Secret Sharing, Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary, Threshold RSA for Dynamic and Ad-Hoc Groups, Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves, Efficient perfectly secure computation with optimal resilience, On perfectly secure 2PC in the OT-hybrid model, On perfectly secure 2PC in the OT-hybrid model, Introduction to Secret-Sharing, Efficient perfectly secure computation with optimal resilience, Adaptively secure MPC with sublinear communication complexity, BASIC OPERATIONS AMONG ENTANGLED STATES AND THEIR APPLICATIONS TO QUANTUM PROTOCOLS, Semi-quantum secret sharing protocol using W-state, Unnamed Item, An Ideal and Perfect (t, n) Multi-secret Sharing Scheme Based on Finite Geometry, How to fairly reconstruct a shared secret, Escrow-free encryption supporting cryptographic workflow, Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security, Unnamed Item, A New Approach to Image Sharing with High-Security Threshold Structure, Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes, Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network, Unnamed Item, Combiner Driven Management Models and Their Applications, A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem, Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks, Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin, Dynamic quantum secret sharing, Practically Efficient Secure Single-Commodity Multi-market Auctions, Secret sharing schemes for ports of matroids of rank 3, Generalized Secret Sharing Schemes Using N$$^\mu $$MDS Codes, A Key Sharing Scheme over GF(25) to Use in ECC, On Secret Sharing with Nonlinear Product Reconstruction, Some Open Problems in Information-Theoretic Cryptography, Reed-Muller Codes, An Everlasting Secure Non-interactive Timestamping Scheme in the Bounded Storage Model, Hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer, Bit-Slice Auction Circuit, Feedback linearly extended discrete functions



Cites Work