Threshold secret sharing allows a dealer to split a secret s into n shares, such that any t shares allow for reconstructing s, but no t-1 shares reveal any information about s. Leakage-resilient secret sharing requires that the secret remains hidden, even when an adversary additionally obtains a limited amount of leakage from every share. Benhamouda et al. (CRYPTO’18) proved that Shamir’s secret sharing scheme is one bit leakage-resilient for reconstruction threshold t≥0.85n and conjectured that the same holds for t = c.n for any constant 0≤c≤1. Nielsen and Simkin (EUROCRYPT’20) showed that this is the best one can hope for by proving that Shamir’s scheme is not secure against one-bit leakage when t0c.n/log(n). In this work, we strengthen ...
Shamir’s (n, k) threshold secret sharing is an important component of several cryptographic protocol...
Shamir's Secret Sharing Scheme is well established and widely used. It allows a so-called Dealer to ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
We revisit the concept of non-malleable secret sharing (Goyal and Kumar, STOC 2018) in the computati...
We study non-malleable secret sharing against joint leakage and joint tampering attacks. Our main re...
Shamir's celebrated secret sharing scheme provides an efficient method for encoding a secret of arbi...
Shamir\u27s celebrated secret sharing scheme provides an efficient method for encoding a secret of a...
Threshold secret sharing schemes enable a dealer to share a secret among $n$ parties such that only ...
Secret sharing enables a dealer to split a secret into a set of shares, in such a way that certain a...
We study robust secret sharing schemes in which between one third and one half of the players are co...
In this paper, we consider linear secret sharing schemes over a finite field F q , where the secret ...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
Producción CientíficaAbstract: In this paper we consider linear secret sharing schemes over a finite...
We prove that a known approach to improve Shamir’s celebrated secret sharing scheme; i.e., adding an...
We prove that a known approach to improve Shamir\u27s celebrated secret sharing scheme; i.e., adding...
Shamir’s (n, k) threshold secret sharing is an important component of several cryptographic protocol...
Shamir's Secret Sharing Scheme is well established and widely used. It allows a so-called Dealer to ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
We revisit the concept of non-malleable secret sharing (Goyal and Kumar, STOC 2018) in the computati...
We study non-malleable secret sharing against joint leakage and joint tampering attacks. Our main re...
Shamir's celebrated secret sharing scheme provides an efficient method for encoding a secret of arbi...
Shamir\u27s celebrated secret sharing scheme provides an efficient method for encoding a secret of a...
Threshold secret sharing schemes enable a dealer to share a secret among $n$ parties such that only ...
Secret sharing enables a dealer to split a secret into a set of shares, in such a way that certain a...
We study robust secret sharing schemes in which between one third and one half of the players are co...
In this paper, we consider linear secret sharing schemes over a finite field F q , where the secret ...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
Producción CientíficaAbstract: In this paper we consider linear secret sharing schemes over a finite...
We prove that a known approach to improve Shamir’s celebrated secret sharing scheme; i.e., adding an...
We prove that a known approach to improve Shamir\u27s celebrated secret sharing scheme; i.e., adding...
Shamir’s (n, k) threshold secret sharing is an important component of several cryptographic protocol...
Shamir's Secret Sharing Scheme is well established and widely used. It allows a so-called Dealer to ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...