We present a novel method for constructing linear secret sharing schemes (LSSS) from linear error correcting codes and linear universal hash functions in a blackbox way. The main advantage of this new construction is that the privacy property of the resulting secret sharing scheme essentially becomes independent of the code we use, only depending on its rate. This allows us to fully harness the algorithmic properties of recent code constructions such as efficient encoding and decoding or efficient list-decoding. Choosing the error correcting codes and universal hash functions involved carefully, we obtain solutions to the following open problems: - A linear near-threshold secret sharing scheme with both linear time sharing and reconstruc...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Secret sharing has been a subject of study since 1979. In the secret sharing schemes there are some ...
Secret sharing is an important building block in cryptography. All explicit secret sharing schemes w...
We present a novel method for constructing linear secret sharing schemes (LSSS) from linear error co...
Abstract. We present a novel method for constructing linear secret sharing schemes (LSSS) from linea...
Secret sharing schemes have been studied for over twenty years. An important ap-proach to the constr...
A secret sharing scheme is a method of distributing a secret among a group of participants in such a...
Secret sharing schemes, introduced by Blakley and Shamir independently in 1979, have a number of app...
We prove that a known general approach to improve Shamir’s celebrated secret sharing scheme; i.e., a...
Homomorphic secret sharing (HSS) is a form of secret sharing that supports the local evaluation of f...
We present a construction of log-depth formulae for various threshold functions based on atomic thre...
The topic of this dissertation is Cryptography, and its connections with Coding Theory. Concretely, ...
The study of secret sharing schemes was independently initiated by Shamir and Blakely in 1979. Since...
Function sharing deals with the problem of distribution of the computation of a function (such as de...
Shamir's celebrated secret sharing scheme provides an efficient method for encoding a secret of arbi...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Secret sharing has been a subject of study since 1979. In the secret sharing schemes there are some ...
Secret sharing is an important building block in cryptography. All explicit secret sharing schemes w...
We present a novel method for constructing linear secret sharing schemes (LSSS) from linear error co...
Abstract. We present a novel method for constructing linear secret sharing schemes (LSSS) from linea...
Secret sharing schemes have been studied for over twenty years. An important ap-proach to the constr...
A secret sharing scheme is a method of distributing a secret among a group of participants in such a...
Secret sharing schemes, introduced by Blakley and Shamir independently in 1979, have a number of app...
We prove that a known general approach to improve Shamir’s celebrated secret sharing scheme; i.e., a...
Homomorphic secret sharing (HSS) is a form of secret sharing that supports the local evaluation of f...
We present a construction of log-depth formulae for various threshold functions based on atomic thre...
The topic of this dissertation is Cryptography, and its connections with Coding Theory. Concretely, ...
The study of secret sharing schemes was independently initiated by Shamir and Blakely in 1979. Since...
Function sharing deals with the problem of distribution of the computation of a function (such as de...
Shamir's celebrated secret sharing scheme provides an efficient method for encoding a secret of arbi...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Secret sharing has been a subject of study since 1979. In the secret sharing schemes there are some ...
Secret sharing is an important building block in cryptography. All explicit secret sharing schemes w...