Short leakage resilient and non-malleable secret sharing schemes

N Chandran, B Kanukurthi, SLB Obbattu… - Annual International …, 2022 - Springer
Leakage resilient secret sharing (LRSS) allows a dealer to share a secret amongst n parties
such that any authorized subset of the parties can recover the secret from their shares, while …

Non-malleable secret sharing against bounded joint-tampering attacks in the plain model

G Brian, A Faonio, M Obremski, M Simkin… - Annual International …, 2020 - Springer
Secret sharing enables a dealer to split a secret into a set of shares, in such a way that
certain authorized subsets of share holders can reconstruct the secret, whereas all …

Multi-source non-malleable extractors and applications

V Goyal, A Srinivasan, C Zhu - … on the Theory and Applications of …, 2021 - Springer
We introduce a natural generalization of two-source non-malleable extractors (Cheragachi
and Guruswami, TCC 2014) called as multi-source non-malleable extractors. Multi-source …

Unconditionally secure non-malleable secret sharing and circular external difference families

S Veitch, DR Stinson - Designs, Codes and Cryptography, 2024 - Springer
Various notions of non-malleable secret sharing schemes have been considered. In this
paper, we review the existing work on non-malleable secret sharing and suggest a novel …

Leakage-resilient secret sharing in non-compartmentalized models

F Lin, M Cheraghchi, V Guruswami… - 1st Conference on …, 2020 - drops.dagstuhl.de
Leakage-resilient secret sharing has mostly been studied in the compartmentalized models,
where a leakage oracle can arbitrarily leak bounded number of bits from all shares, provided …

Leakage and tamper resilient permutation-based cryptography

C Dobraunig, B Mennink, R Primas - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Implementation attacks such as power analysis and fault attacks have shown that, if potential
attackers have physical access to a cryptographic device, achieving practical security …

Continuously non-malleable secret sharing for general access structures

G Brian, A Faonio, D Venturi - Theory of Cryptography Conference, 2019 - Springer
We study leakage-resilient continuously non-malleable secret sharing, as recently
introduced by Faonio and Venturi (CRYPTO 2019). In this setting, an attacker can …

Continuously non-malleable secret sharing: joint tampering, plain model and capacity

G Brian, A Faonio, D Venturi - Theory of Cryptography Conference, 2021 - Springer
We study non-malleable secret sharing against joint leakage and joint tampering attacks.
Our main result is the first threshold secret sharing scheme in the plain model achieving …

Evolving secret sharing made short

D Francati, D Venturi - International Conference on the Theory and …, 2025 - Springer
Abstract Evolving secret sharing (Komargodski, Naor, and Yogev, TCC'16) generalizes the
notion of secret sharing to the setting of evolving access structures, in which the share …

Protecting distributed primitives against leakage: equivocal secret sharing and more

C Hazay, M Venkitasubramaniam, M Weiss - Journal of Cryptology, 2025 - Springer
Leakage-resilient cryptography aims to protect cryptographic primitives from so-called “side
channel attacks” that exploit their physical implementation to learn their input or secret state …