Quantum multi-secret sharing via trap codes and discrete quantum walks

S Samadder Chaudhury, S Dutta - Quantum Information Processing, 2022 - Springer
In this paper, we propose a fully quantum multi-secret sharing scheme. In contrast with
regular secret sharing schemes, multi-secret sharing schemes share a set of unknown …

Approximate degree in classical and quantum computing

M Bun, J Thaler - Foundations and Trends® in Theoretical …, 2022 - nowpublishers.com
Approximate Degree in Classical and Quantum Computing Page 1 Approximate Degree in
Classical and Quantum Computing Page 2 Other titles in Foundations and Trends® in …

Locally decodable codes with randomized encoding

K Cheng, X Li, Y Zheng - arXiv preprint arXiv:2001.03692, 2020 - arxiv.org
We initiate a study of locally decodable codes with randomized encoding. Standard locally
decodable codes are error correcting codes with a deterministic encoding function and a …

[PDF][PDF] The large-error approximate degree of ac^ 0

M Bun, J Thaler - Theory of computing, 2018 - open.bu.edu
We prove two new results about the inability of low-degree polynomials to uniformly
approximate constant-depth circuits, even to slightly-better-than-trivial error. First, we prove a …

Secret sharing with binary shares

F Lin, M Cheraghchi, V Guruswami… - arXiv preprint arXiv …, 2018 - arxiv.org
Shamir's celebrated secret sharing scheme provides an efficient method for encoding a
secret of arbitrary length $\ell $ among any $ N\leq 2^\ell $ players such that for a threshold …

Secret Sharing on Superconcentrator

Y Li - arXiv preprint arXiv:2302.04482, 2023 - arxiv.org
Using information inequalities, we prove any unrestricted arithmetic circuits computing the
shares of any $(t, n) $-threshold secret sharing scheme must satisfy some superconcentrator …

Non-malleable codes, extractors and secret sharing for interleaved tampering and composition of tampering

E Chattopadhyay, X Li - … 18th International Conference, TCC 2020, Durham …, 2020 - Springer
Non-malleable codes were introduced by Dziembowski, Pietrzak, and Wichs (JACM 2018)
as a generalization of standard error correcting codes to handle severe forms of tampering …

Constructions of Secret Sharing Schemes – Accommodating New Parties

SS Chaudhury, S Dutta, K Sakurai - International Conference on Network …, 2020 - Springer
The possibility of implementing secret sharing in the complexity class AC^ 0 AC 0 was
shown in a recent work by Bogdanov et al.(Crypto'16) who provided constructions of ramp …

Perpetual secret sharing from dynamic data structures

SS Chaudhury, S Dutta… - 2021 IEEE Conference on …, 2021 - ieeexplore.ieee.org
In this paper we propose a secret sharing scheme where the access structure changes over
time following a dynamic data structure. The proposed scheme can accommodate an …

The Large-Error Approximate Degree of AC

M Bun, J Thaler - Theory of Computing, 2021 - theoryofcomputing.org
We prove two new results about the inability of low-degree polynomials to uniformly
approximate constant-depth circuits, even to slightly-better-than-trivial error. First, we prove a …