© International Association for Cryptologic Research 2017. We present new protocols for conditional disclosure of secrets (CDS), where two parties want to disclose a secret to a third party if and only if their respective inputs satisfy some predicate. – For general predicates (Formula Presented.), we present two protocols that achieve o(N1/2) communication: the first achieves O(N1/3) communication and the second achieves sub-polynomial (Formula Presented.) communication. – As a corollary, we obtain improved share complexity for forbidden graph access structures. Namely, for every graph on N vertices, there is a secret-sharing scheme for N parties in which each pair of parties can reconstruct the secret if and only if the corresponding vert...
textabstractMultiplicative linear secret sharing is a fundamental notion in the area of secure multi...
Information-theoretic cryptography is full of open problems with a communication-complexity flavor. ...
Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty comput...
Abstract. We initiate a systematic treatment of the communication complexity of conditional disclosu...
We initiate a systematic treatment of the communication complexity of conditional disclosure of secr...
This electronic version was submitted by the student author. The certified thesis is available in th...
Many protocols that are based on homomorphic encryption are private only if a client submits inputs ...
In the conditional disclosure of secrets (CDS) problem (Gertner et al., J. Comput. Syst. Sci., 2000)...
In a $k$-party CDS protocol, each party sends one message to a referee (without seeing the other mes...
A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some ...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
The purpose of this paper is to decribe a very powerful decomposition construction for perfect secre...
Optimizing the maximum, or average, length of the shares in relation to the length of the secret for...
In a Conditional Disclosure of Secrets (CDS) a verifier V wants to reveal a message m to a prover P...
All known constructions of information theoretic t-out-of-n secret sharing schemes require secure, ...
textabstractMultiplicative linear secret sharing is a fundamental notion in the area of secure multi...
Information-theoretic cryptography is full of open problems with a communication-complexity flavor. ...
Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty comput...
Abstract. We initiate a systematic treatment of the communication complexity of conditional disclosu...
We initiate a systematic treatment of the communication complexity of conditional disclosure of secr...
This electronic version was submitted by the student author. The certified thesis is available in th...
Many protocols that are based on homomorphic encryption are private only if a client submits inputs ...
In the conditional disclosure of secrets (CDS) problem (Gertner et al., J. Comput. Syst. Sci., 2000)...
In a $k$-party CDS protocol, each party sends one message to a referee (without seeing the other mes...
A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some ...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
The purpose of this paper is to decribe a very powerful decomposition construction for perfect secre...
Optimizing the maximum, or average, length of the shares in relation to the length of the secret for...
In a Conditional Disclosure of Secrets (CDS) a verifier V wants to reveal a message m to a prover P...
All known constructions of information theoretic t-out-of-n secret sharing schemes require secure, ...
textabstractMultiplicative linear secret sharing is a fundamental notion in the area of secure multi...
Information-theoretic cryptography is full of open problems with a communication-complexity flavor. ...
Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty comput...