Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Non-malleable secret sharing - MaRDI portal

Non-malleable secret sharing

From MaRDI portal
Publication:5230330

DOI10.1145/3188745.3188872zbMath1428.94105OpenAlexW2809607206MaRDI QIDQ5230330

Vipul Goyal, Ashutosh Kumar

Publication date: 22 August 2019

Published in: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/3188745.3188872




Related Items (25)

Adaptive extractors and their application to leakage resilient secret sharingConstructing locally leakage-resilient linear secret-sharing schemesSecret sharing with statistical privacy and computational relaxed non-malleabilityZK-PCPs from leakage-resilient secret sharingContinuously non-malleable secret sharing for general access structuresInteractive non-malleable codesPrivacy amplification from non-malleable codes(Nondeterministic) hardness vs. non-malleabilityShort leakage resilient and non-malleable secret sharing schemesOn secret sharing, randomness, and random-less reductions for secret sharingLeakage-resilient linear secret-sharing against arbitrary bounded-size leakage familyExtractors: low entropy requirements colliding with non-malleabilityNew bounds on the local leakage resilience of Shamir's secret sharing schemeContinuously non-malleable secret sharing: joint tampering, plain model and capacityContinuously non-malleable codes in the split-state modelNonmalleable Extractors and Codes, with Their Many Tampered ExtensionsExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationOn the local leakage resilience of linear secret sharing schemesFair hierarchical secret sharing scheme based on smart contractLower bounds for leakage-resilient secret sharingLeakage-resilience of the Shamir secret-sharing scheme against physical-bit leakagesMulti-source non-malleable extractors and applicationsNon-malleability against polynomial tamperingNon-malleable secret sharing against bounded joint-tampering attacks in the plain modelNearly optimal robust secret sharing against rushing adversaries




This page was built for publication: Non-malleable secret sharing