Secure Computation from Random Error Correcting Codes

From MaRDI portal
Publication:5429397

DOI10.1007/978-3-540-72540-4_17zbMath1141.94346OpenAlexW2136563111MaRDI QIDQ5429397

Robbert de Haan, Shafi Goldwasser, Hao Chen, Vinod Vaikuntanathan, Ronald Cramer

Publication date: 29 November 2007

Published in: Advances in Cryptology - EUROCRYPT 2007 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-72540-4_17




Related Items (34)

Smoothing out binary linear codes and worst-case sub-exponential hardness for LPNHigher Hamming weights for locally recoverable codes on algebraic curvesSecret Sharing Schemes with Algebraic Properties and ApplicationsRecent Advances in Non-perfect Secret Sharing SchemesRefined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth's second towerZero-knowledge IOPs with linear-time prover and polylogarithmic-time verifierAlgebraic geometric secret sharing schemes over large fields are asymptotically thresholdOn \(d\)-multiplicative secret sharingRelative generalized Hamming weights of \(q\)-ary Reed-Muller codesA simple combinatorial treatment of constructions and threshold gaps of ramp schemesSecret sharing schemes with strong multiplication and a large number of players from toric varietiesClassical access structures of ramp secret sharing based on quantum stabilizer codesTwo new classes of Hermitian self-orthogonal non-GRS MDS codes and their applicationsHow to recover a secret with \(O(n)\) additionsMessage randomization and strong security in quantum stabilizer-based secret sharing for classical secretsAsymptotically good multiplicative LSSS over Galois rings and applications to MPC over \(\mathbb{Z}/p^k\mathbb{Z} \)Geometric and Computational Approach to Classical and Quantum Secret SharingThe optimal linear secret sharing scheme for any given access structureA note on ramp secret sharing schemes from error-correcting codesConditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and SeparationsNon-malleable coding against bit-wise and split-state tamperingInteractive function computation via polar codingThree-level secret sharing schemes from the twisted cubicOn the Construction of (n, k)-schemes of Visual Cryptography Using a Class of Linear Hash Functions Over a Binary FieldOT-Combiners via Secure ComputationPolynomial Evaluation and Side Channel AnalysisStrongly Multiplicative Ramp Schemes from High Degree Rational Points on CurvesIsolated Proofs of Knowledge and Isolated Zero KnowledgeСхема разделения секрета типа схемы Блэкли, основанная на пересечении подпространствBlackbox secret sharing revisited: a coding-theoretic approach with application to expansionless near-threshold schemesEvolving ramp secret sharing with a small gapA linear code based on resilient Boolean maps whose dual is a platform for a robust secret sharing schemeTheory of supports for linear codes endowed with the sum-rank metricOn Secret Sharing with Nonlinear Product Reconstruction




This page was built for publication: Secure Computation from Random Error Correcting Codes