Non-malleable secret sharing
From MaRDI portal
Publication:5230330
DOI10.1145/3188745.3188872zbMath1428.94105OpenAlexW2809607206MaRDI QIDQ5230330
Publication date: 22 August 2019
Published in: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/3188745.3188872
secret sharingnon-malleable codesthreshold cryptographynon-malleable secret sharingnon-malleable message transmission
Related Items (25)
Adaptive extractors and their application to leakage resilient secret sharing ⋮ Constructing locally leakage-resilient linear secret-sharing schemes ⋮ Secret sharing with statistical privacy and computational relaxed non-malleability ⋮ ZK-PCPs from leakage-resilient secret sharing ⋮ Continuously non-malleable secret sharing for general access structures ⋮ Interactive non-malleable codes ⋮ Privacy amplification from non-malleable codes ⋮ (Nondeterministic) hardness vs. non-malleability ⋮ Short leakage resilient and non-malleable secret sharing schemes ⋮ On secret sharing, randomness, and random-less reductions for secret sharing ⋮ Leakage-resilient linear secret-sharing against arbitrary bounded-size leakage family ⋮ Extractors: low entropy requirements colliding with non-malleability ⋮ New bounds on the local leakage resilience of Shamir's secret sharing scheme ⋮ Continuously non-malleable secret sharing: joint tampering, plain model and capacity ⋮ Continuously non-malleable codes in the split-state model ⋮ Nonmalleable Extractors and Codes, with Their Many Tampered Extensions ⋮ Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification ⋮ On the local leakage resilience of linear secret sharing schemes ⋮ Fair hierarchical secret sharing scheme based on smart contract ⋮ Lower bounds for leakage-resilient secret sharing ⋮ Leakage-resilience of the Shamir secret-sharing scheme against physical-bit leakages ⋮ Multi-source non-malleable extractors and applications ⋮ Non-malleability against polynomial tampering ⋮ Non-malleable secret sharing against bounded joint-tampering attacks in the plain model ⋮ Nearly optimal robust secret sharing against rushing adversaries
This page was built for publication: Non-malleable secret sharing