Short leakage resilient and non-malleable secret sharing schemes
From MaRDI portal
Publication:6097261
DOI10.1007/978-3-031-15802-5_7zbMath1516.94058OpenAlexW4312405315MaRDI QIDQ6097261
Sai Lakshmi Bhavana Obbattu, Nishanth Chandran, Bhavana Kanukurthi, Sruthi Sekar
Publication date: 12 June 2023
Published in: Advances in Cryptology – CRYPTO 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-15802-5_7
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Non-malleable randomness encoders and their applications
- Randomness is linear in space
- Lower bounds for leakage-resilient secret sharing
- Leakage-resilience of the Shamir secret-sharing scheme against physical-bit leakages
- Non-malleable secret sharing against bounded joint-tampering attacks in the plain model
- Adaptive extractors and their application to leakage resilient secret sharing
- Constructing locally leakage-resilient linear secret-sharing schemes
- ZK-PCPs from leakage-resilient secret sharing
- Continuously non-malleable secret sharing for general access structures
- Revisiting non-malleable secret sharing
- Non-malleable secret sharing in the computational setting: adaptive tampering, noisy-leakage resilience, and improved rate
- Leakage resilient secret sharing and applications
- Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures
- How to share a function securely
- Construction of extractors using pseudo-random generators (extended abstract)
- Tamper and Leakage Resilience in the Split-State Model
- How to Compute under $${\mathcal {\varvec{AC}}}^\mathbf{0}$$ Leakage without Secure Hardware
- How to share a secret
- Leakage-Resilient Coin Tossing
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
- Leakage-Resilient Storage
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Privacy Amplification by Public Discussion
- All-or-nothing encryption and the package transform
- Generalized privacy amplification
- Non-malleable secret sharing
- Leakage-Resilient Non-malleable Codes
- Invertible Extractors and Wiretap Protocols
- Repairing Reed-solomon codes
- Advances in Cryptology - CRYPTO 2003
- Extractors and pseudorandom generators
- Theory of Cryptography
- On the local leakage resilience of linear secret sharing schemes
- Extracting all the randomness and reducing the error in Trevisan's extractors
This page was built for publication: Short leakage resilient and non-malleable secret sharing schemes