We present information-theoretically secure schemes for sharing and modifying secrets among a dynamic swarm of computing de-vices. The schemes support an unlimited number of changes to the swarm including players joining and leaving the swarm, while swarms may be merged, cloned or split. The schemes securely and distributively maintain a global state for the swarm, and support an unlimited number of changes to the state according to received in-put. Our schemes are based on a novel construction of a strongly oblivious universal Turing Machine and on a distributed evaluation of this TM that reveals nothing to an adversary beyond a bound on the space complexity of the TM
© 2017 Kim Sasha RamchenA fundamental problem in large distributed systems is how to enable parties ...
We consider the generic problem of Secure Aggregation of Distributed Information (SADI), where sever...
A Distributed Secret Sharing Protocol (DSSP for short) allows a dealer to share multiple secrets ...
The importance of swarm robotics systems in both academic research and real-world applications is st...
. We propose a new construction for computationally secure secret sharing schemes with general acces...
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof ...
Secure multi-party computation (secure MPC) has been established as the de facto paradigm for protec...
Abstract. Secret sharing schemes divide a secret among multiple par-ticipants so that only authorize...
We revisit the concept of non-malleable secret sharing (Goyal and Kumar, STOC 2018) in the computati...
AbstractLet P be a set of participants sharing a secret from a set of secrets. A secret sharing sche...
Robust secret sharing enables the reconstruction of a secret-shared message in the presence of up to...
In the problem of swarm computing, n agents wish to securely and distributively perform a computatio...
In recent years, the rapidly increasing data base scales and complexities arising from various engin...
We prove that a known approach to improve Shamir’s celebrated secret sharing scheme; i.e., adding an...
We present a new protocol for the verifiable redistribution of secrets from (m,n) to (m # ,n # ) acc...
© 2017 Kim Sasha RamchenA fundamental problem in large distributed systems is how to enable parties ...
We consider the generic problem of Secure Aggregation of Distributed Information (SADI), where sever...
A Distributed Secret Sharing Protocol (DSSP for short) allows a dealer to share multiple secrets ...
The importance of swarm robotics systems in both academic research and real-world applications is st...
. We propose a new construction for computationally secure secret sharing schemes with general acces...
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof ...
Secure multi-party computation (secure MPC) has been established as the de facto paradigm for protec...
Abstract. Secret sharing schemes divide a secret among multiple par-ticipants so that only authorize...
We revisit the concept of non-malleable secret sharing (Goyal and Kumar, STOC 2018) in the computati...
AbstractLet P be a set of participants sharing a secret from a set of secrets. A secret sharing sche...
Robust secret sharing enables the reconstruction of a secret-shared message in the presence of up to...
In the problem of swarm computing, n agents wish to securely and distributively perform a computatio...
In recent years, the rapidly increasing data base scales and complexities arising from various engin...
We prove that a known approach to improve Shamir’s celebrated secret sharing scheme; i.e., adding an...
We present a new protocol for the verifiable redistribution of secrets from (m,n) to (m # ,n # ) acc...
© 2017 Kim Sasha RamchenA fundamental problem in large distributed systems is how to enable parties ...
We consider the generic problem of Secure Aggregation of Distributed Information (SADI), where sever...
A Distributed Secret Sharing Protocol (DSSP for short) allows a dealer to share multiple secrets ...