Non-malleable secret sharing

V Goyal, A Kumar - Proceedings of the 50th Annual ACM SIGACT …, 2018 - dl.acm.org
A number of works have focused on the setting where an adversary tampers with the shares
of a secret sharing scheme. This includes literature on verifiable secret sharing, algebraic …

Adaptive extractors and their application to leakage resilient secret sharing

N Chandran, B Kanukurthi, SLB Obbattu… - Annual International …, 2021 - Springer
Abstract We introduce Adaptive Extractors, which unlike traditional randomness extractors,
guarantee security even when an adversary obtains leakage on the source after observing …

Perfectly Secure Message Transmission Tolerating Omission Faults--Possibility Feasibility, and Optimality

R Kishore - Proceedings of the 26th International Conference on …, 2025 - dl.acm.org
In a given graph with two designated nodes, namely the S ender and the R eceiver, an
adversary can corrupt up to any t nodes (except for S and R) of its choice in an Omission …

Locally reconstructable non-malleable secret sharing

B Kanukurthi, SLB Obbattu, S Sekar… - Cryptology ePrint …, 2021 - eprint.iacr.org
Non-malleable secret sharing (NMSS) schemes, introduced by Goyal and Kumar (STOC
2018), ensure that a secret $ m $ can be distributed into shares $ m_1,..., m_n $(for some …

[PDF][PDF] Constant Rate (Non-malleable) Secret Sharing Schemes Tolerating Joint Adaptive Leakage.

N Chandran, B Kanukurthi, SLB Obbattu… - IACR Cryptol. ePrint …, 2020 - iacr.steepath.eu
Abstract A Leakage Resilient Secret Sharing (LRSS) is a secure secret sharing scheme,
even when the adversary obtains some (bounded) leakage on honest shares. Ideally, such …

Perfectly secure message transmission over partially synchronous networks

R Kishore, A Inumella, K Srinathan - Proceedings of the 20th …, 2019 - dl.acm.org
In a distributed network, we consider two special nodes called the sender S and the receiver
R that are connected by n node-disjoint (except for S and R) bi-directional wires. Out of …