AbstractUsing a random deal of cards to players and a computationally unlimited eavesdropper, all players wish to share a common one-bit secret key which is information-theoretically secure from the eavesdropper. This can be done by the so-called key set protocols. In this paper, we give a necessary and sufficient condition for a key set protocol to be “optimal”, that is, to succeed always in sharing a one-bit secret key
© International Association for Cryptologic Research 2015. In this paper we consider the problem of ...
We consider the problem of secret sharing among $n$ rational players. This problem was introduced by...
Shamir’s (n, k) threshold secret sharing is an important component of several cryptographic protocol...
AbstractUsing a random deal of cards to players and a computationally unlimited eavesdropper, all pl...
The multiparty secret key exchange problem is to find a k-player protocol for generating an n-bit ra...
Abstract Assume that there are players and an eavesdropper Eve of unlimited computational power and ...
Abstract—We consider perfect secret key generation for a “pair-wise independent network ” model in w...
Threshold secret sharing schemes enable a dealer to share a secret among $n$ parties such that only ...
Consider a sender ? and a group of n recipients. ? holds a secret message ? of length l bits and the...
Komargodski et.al. introduced {\em Evolving Secret Sharing} which allows an imaprtial participant, c...
Abstract Assume that there are players and an eavesdropper Eve of unlimited computational power and ...
Symmetric password-authenticated key exchange (sPAKE) can be seen as an extension of traditional key...
It is known that the mutual information, in the sense of Kolmogorov complexity, of any pair of strin...
The elegant “five-card trick” of den Boer (EUROCRYPT 1989) allows two players to securely compute a ...
AbstractLet P be a set of participants sharing a secret from a set of secrets. A secret sharing sche...
© International Association for Cryptologic Research 2015. In this paper we consider the problem of ...
We consider the problem of secret sharing among $n$ rational players. This problem was introduced by...
Shamir’s (n, k) threshold secret sharing is an important component of several cryptographic protocol...
AbstractUsing a random deal of cards to players and a computationally unlimited eavesdropper, all pl...
The multiparty secret key exchange problem is to find a k-player protocol for generating an n-bit ra...
Abstract Assume that there are players and an eavesdropper Eve of unlimited computational power and ...
Abstract—We consider perfect secret key generation for a “pair-wise independent network ” model in w...
Threshold secret sharing schemes enable a dealer to share a secret among $n$ parties such that only ...
Consider a sender ? and a group of n recipients. ? holds a secret message ? of length l bits and the...
Komargodski et.al. introduced {\em Evolving Secret Sharing} which allows an imaprtial participant, c...
Abstract Assume that there are players and an eavesdropper Eve of unlimited computational power and ...
Symmetric password-authenticated key exchange (sPAKE) can be seen as an extension of traditional key...
It is known that the mutual information, in the sense of Kolmogorov complexity, of any pair of strin...
The elegant “five-card trick” of den Boer (EUROCRYPT 1989) allows two players to securely compute a ...
AbstractLet P be a set of participants sharing a secret from a set of secrets. A secret sharing sche...
© International Association for Cryptologic Research 2015. In this paper we consider the problem of ...
We consider the problem of secret sharing among $n$ rational players. This problem was introduced by...
Shamir’s (n, k) threshold secret sharing is an important component of several cryptographic protocol...