Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Short leakage resilient and non-malleable secret sharing schemes
Leakage resilient secret sharing (LRSS) allows a dealer to share a secret amongst n parties
such that any authorized subset of the parties can recover the secret from their shares, while …
such that any authorized subset of the parties can recover the secret from their shares, while …
Non-malleable secret sharing against bounded joint-tampering attacks in the plain model
Secret sharing enables a dealer to split a secret into a set of shares, in such a way that
certain authorized subsets of share holders can reconstruct the secret, whereas all …
certain authorized subsets of share holders can reconstruct the secret, whereas all …
Multi-source non-malleable extractors and applications
We introduce a natural generalization of two-source non-malleable extractors (Cheragachi
and Guruswami, TCC 2014) called as multi-source non-malleable extractors. Multi-source …
and Guruswami, TCC 2014) called as multi-source non-malleable extractors. Multi-source …
Unconditionally secure non-malleable secret sharing and circular external difference families
Various notions of non-malleable secret sharing schemes have been considered. In this
paper, we review the existing work on non-malleable secret sharing and suggest a novel …
paper, we review the existing work on non-malleable secret sharing and suggest a novel …
Leakage-resilient secret sharing in non-compartmentalized models
Leakage-resilient secret sharing has mostly been studied in the compartmentalized models,
where a leakage oracle can arbitrarily leak bounded number of bits from all shares, provided …
where a leakage oracle can arbitrarily leak bounded number of bits from all shares, provided …
Leakage and tamper resilient permutation-based cryptography
Implementation attacks such as power analysis and fault attacks have shown that, if potential
attackers have physical access to a cryptographic device, achieving practical security …
attackers have physical access to a cryptographic device, achieving practical security …
Continuously non-malleable secret sharing for general access structures
We study leakage-resilient continuously non-malleable secret sharing, as recently
introduced by Faonio and Venturi (CRYPTO 2019). In this setting, an attacker can …
introduced by Faonio and Venturi (CRYPTO 2019). In this setting, an attacker can …
Continuously non-malleable secret sharing: joint tampering, plain model and capacity
We study non-malleable secret sharing against joint leakage and joint tampering attacks.
Our main result is the first threshold secret sharing scheme in the plain model achieving …
Our main result is the first threshold secret sharing scheme in the plain model achieving …
Evolving secret sharing made short
Abstract Evolving secret sharing (Komargodski, Naor, and Yogev, TCC'16) generalizes the
notion of secret sharing to the setting of evolving access structures, in which the share …
notion of secret sharing to the setting of evolving access structures, in which the share …
Protecting distributed primitives against leakage: equivocal secret sharing and more
Leakage-resilient cryptography aims to protect cryptographic primitives from so-called “side
channel attacks” that exploit their physical implementation to learn their input or secret state …
channel attacks” that exploit their physical implementation to learn their input or secret state …