Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors - MaRDI portal

Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors

From MaRDI portal
Publication:5458609

DOI10.1007/978-3-540-78967-3_27zbMath1149.94333OpenAlexW1490273987MaRDI QIDQ5458609

Serge Fehr, Ronald Cramer, Daniel Wichs, Carles Padró, Yevgeniy Dodis

Publication date: 15 April 2008

Published in: Advances in Cryptology – EUROCRYPT 2008 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-78967-3_27




Related Items (47)

Robustly reusable fuzzy extractor with imperfect randomnessLWE without modular reduction and improved side-channel attacks against BLISSConstruction and nonexistence of strong external difference familiesBinary AMD Circuits from Secure Multiparty ComputationInteractive communication with unknown noise rateA generic construction of fuzzy signatureRamp secret sharing with cheater identification in presence of rushing cheatersExistence and non-existence results for strong external difference familiesDetection of Algebraic Manipulation in the Presence of LeakageSplitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codesDetecting Algebraic Manipulation in Leaky Storage SystemsUnconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and RobustnessPublic-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary FunctionsNonmalleable digital lockers and robust fuzzy extractors in the plain modelArithmetic sketchingDisjoint difference families and their applicationsComputational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropyAlgebraic manipulation detection codesRobustly reusable fuzzy extractor from standard assumptionsWeighted external difference families and R-optimal AMD codesHow to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key AttacksCodes for Detection of Limited View Algebraic TamperingAn Improved Robust Fuzzy ExtractorNonexistence of strong external difference families in abelian groups of order being product of at most three primesNon-Malleable Codes from Additive CombinatoricsOn encoding polynomials for strong algebraic manipulation detection codesNew existence and nonexistence results for strong external difference familiesEfficient Error-Correcting Codes for Sliding WindowsEfficient robust secret sharing from expander graphsNon-malleable coding against bit-wise and split-state tamperingNearly optimal robust secret sharingCharacterising bimodal collections of sets in finite groupsReusable fuzzy extractors for low-entropy distributionsRound-optimal secure multi-party computationOn the equivalence of authentication codes and robust (2, 2)-threshold schemesReusable fuzzy extractor from the decisional Diffie-Hellman assumptionOptimal Computational Split-state Non-malleable CodesAlgebraic manipulation detection codes via highly nonlinear functionsSome results on generalized strong external difference familiesCombinatorial characterizations of algebraic manipulation detection codes involving generalized difference familiesKey Agreement from Close Secrets over Unsecured ChannelsGoing beyond dual execution: MPC for functions with efficient verificationOn Complete Primitives for FairnessOn Related-Secret PseudorandomnessA new class of security oriented error correcting robust codesOn optimal weak algebraic manipulation detection codes and weighted external difference familiesNearly optimal robust secret sharing against rushing adversaries




This page was built for publication: Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors