Short leakage resilient and non-malleable secret sharing schemes
N Chandran, B Kanukurthi, SLB Obbattu… - Annual International …, 2022 - Springer
Leakage resilient secret sharing (LRSS) allows a dealer to share a secret amongst n parties
such that any authorized subset of the parties can recover the secret from their shares, while …
such that any authorized subset of the parties can recover the secret from their shares, while …
Non-malleable secret sharing against bounded joint-tampering attacks in the plain model
Secret sharing enables a dealer to split a secret into a set of shares, in such a way that
certain authorized subsets of share holders can reconstruct the secret, whereas all …
certain authorized subsets of share holders can reconstruct the secret, whereas all …
Unconditionally secure non-malleable secret sharing and circular external difference families
S Veitch, DR Stinson - Designs, Codes and Cryptography, 2024 - Springer
Various notions of non-malleable secret sharing schemes have been considered. In this
paper, we review the existing work on non-malleable secret sharing and suggest a novel …
paper, we review the existing work on non-malleable secret sharing and suggest a novel …
Continuously non-malleable secret sharing: joint tampering, plain model and capacity
We study non-malleable secret sharing against joint leakage and joint tampering attacks.
Our main result is the first threshold secret sharing scheme in the plain model achieving …
Our main result is the first threshold secret sharing scheme in the plain model achieving …
Adaptive extractors and their application to leakage resilient secret sharing
N Chandran, B Kanukurthi, SLB Obbattu… - Annual International …, 2021 - Springer
Abstract We introduce Adaptive Extractors, which unlike traditional randomness extractors,
guarantee security even when an adversary obtains leakage on the source after observing …
guarantee security even when an adversary obtains leakage on the source after observing …
Protecting distributed primitives against leakage: Equivocal secret sharing and more
Leakage-resilient cryptography aims to protect cryptographic primitives from so-called “side
channel attacks” that exploit their physical implementation to learn their input or secret state …
channel attacks” that exploit their physical implementation to learn their input or secret state …
Bounded collusion protocols, cylinder-intersection extractors and leakage-resilient secret sharing
A Kumar, R Meka, D Zuckerman - Cryptology ePrint Archive, 2020 - eprint.iacr.org
In this work we study bounded collusion protocols (BCPs) recently introduced in the context
of secret sharing by Kumar, Meka, and Sahai (FOCS 2019). These are multi-party …
of secret sharing by Kumar, Meka, and Sahai (FOCS 2019). These are multi-party …
Locally reconstructable non-malleable secret sharing
B Kanukurthi, SLB Obbattu, S Sekar… - Cryptology ePrint …, 2021 - eprint.iacr.org
Non-malleable secret sharing (NMSS) schemes, introduced by Goyal and Kumar (STOC
2018), ensure that a secret $ m $ can be distributed into shares $ m_1,..., m_n $(for some …
2018), ensure that a secret $ m $ can be distributed into shares $ m_1,..., m_n $(for some …
[HTML][HTML] Continuously non-malleable codes in the split-state model
Non-malleable codes (Dziembowski et al., ICS'10 and J. ACM'18) are a natural relaxation of
error correcting/detecting codes with useful applications in cryptography. Informally, a code …
error correcting/detecting codes with useful applications in cryptography. Informally, a code …
Practical continuously non-malleable randomness encoders in the random oracle model
A Faonio - International Conference on Cryptology and Network …, 2021 - Springer
A randomness encoder is a generalization of encoding schemes with an efficient procedure
for encoding uniformly random strings. In this paper we continue the study of randomness …
for encoding uniformly random strings. In this paper we continue the study of randomness …