搜索结果: 1-15 共查到“军事学 secret sharing schemes”相关记录34条 . 查询时间(0.046 秒)
On the Local Leakage Resilience of Linear Secret Sharing Schemes
Secret Sharing leakage resilience information theory
2019/6/5
We consider the following basic question: to what extent are standard secret sharing schemes and protocols for secure multiparty computation that build on them resilient to leakage? We focus on a simp...
2-threshold Ideal Secret Sharing Schemes Can Be Uniquely Modeled by Latin Squares
secret sharing ideal secret sharing 2-threshold secret sharing
2019/5/31
In a secret sharing scheme, a secret value is encrypted into several shares, which are distributed among corresponding participants. It requires that only predefined subsets of participants can recons...
Group-homomorphic Secret Sharing Schemes Are Group-characterizable with Normal Subgroups
homomorphic secret sharing schemes group-characterizable distribution quasi-uniform distribution
2019/5/29
A group-characterizable random variable [Chan and Yeung 2002] is induced by a joint distribution on the (left) cosets of some subgroups of a main group. A homomorphic secret sharing scheme [Benaloh 19...
Nearly all secret sharing schemes studied so far are linear or multi-linear schemes. Although these schemes allow to implement any monotone access structure, the share complexity may be suboptimal -- ...
Secret-Sharing Schemes for General and Uniform Access Structures
secret sharing conditional disclosure of secrets protocols private simultaneous messages protocols
2019/3/4
A secret-sharing scheme allows some authorized sets of parties to reconstruct a secret; the collection of authorized sets is called the access structure. For over 30 years, it was known that any (mono...
Stronger Leakage-Resilient and Non-Malleable Secret-Sharing Schemes for General Access Structures
Non-malleable secret sharing Leakage-resilient secret sharing Non-malleable extractors
2018/12/3
In this work we present a collection of compilers that take secret sharing schemes for an arbitrary access structures as input and produce either leakage-resilient or non-malleable secret sharing sche...
Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem
Threshold Secret Sharing Chinese Remainder Theorem Polynomial Ring
2018/11/16
Since (t,n)(t,n)-threshold secret sharing (SS) was initially proposed by Shamir and Blakley separately in 1979, it has been widely used in many aspects. Later on, Asmuth and Bloom presented a (t,n)(t,...
Asymptotically Ideal CRT-based Secret Sharing Schemes for Multilevel and Compartmented Access Structures
cryptographic protocols secret sharing
2018/11/8
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges. Th...
Optimal Linear Secret Sharing Schemes for Graph Access Structures on Six Participants
Secret sharing Optimal information ratio Decomposition techniques
2017/12/25
We review the problem of finding the optimal information ratios of graph access structures on six participants. Study of such access structures were initiated by van Dijk [Des. Codes Cryptogr. 15 (199...
Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
Secret-sharing share size monotone span program
2017/9/28
A secret-sharing scheme realizes the forbidden graph access structure determined by a graph G=(V,E)G=(V,E) if a pair of vertices can reconstruct the secret if and only if it is an edge in GG. Secret-s...
Bounds on the Information Ratios of Secret Sharing Schemes for Close Access Structures
foundations secret sharing
2016/7/28
The information ratio of a secret sharing scheme ΣΣ measures the size of the largest share of the scheme, and is denoted by σ(Σ)σ(Σ). The optimal information ratio of an access structure ΓΓ is the inf...
On the Information Ratio of Non-Perfect Secret Sharing Schemes
Secret sharing Non-perfect secret sharing Information Ratio Polymatroid
2016/1/25
A secret sharing scheme is non-perfect if some subsets of players that cannot recover the
secret value have partial information about it. The information ratio of a secret sharing
scheme is the rati...
SETUP in Secret Sharing Schemes using Random Values
Secret Sharing SETUP Black-Box Cryptography
2016/1/25
Secret sharing schemes divide a secret among multiple participants
so that only authorized subsets of parties can reconstruct it. We
show that SETUP (Secretly Embedded Trapdoor with Universal Protec...
Robust Secret Sharing Schemes Against Local Adversaries
secret sharing macs error-correcting codes
2016/1/6
We study robust secret sharing schemes in which between one third and one half of the
players are corrupted. In this scenario, robust secret sharing is possible only with a share size
larger than th...
Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits
Algebraic function fields torsion limits Riemann-Roch systems of equations
2015/12/29
Recent results of Cascudo, Cramer, and Xing on the construction of
arithmetic secret sharing schemes are improved by using some new bounds
on the torsion limits of algebraic function fields. Further...