搜索结果: 1-7 共查到“军事学 linear secret sharing schemes”相关记录7条 . 查询时间(0.086 秒)
On the Local Leakage Resilience of Linear Secret Sharing Schemes
Secret Sharing leakage resilience information theory
2019/6/5
We consider the following basic question: to what extent are standard secret sharing schemes and protocols for secure multiparty computation that build on them resilient to leakage? We focus on a simp...
Optimal Linear Secret Sharing Schemes for Graph Access Structures on Six Participants
Secret sharing Optimal information ratio Decomposition techniques
2017/12/25
We review the problem of finding the optimal information ratios of graph access structures on six participants. Study of such access structures were initiated by van Dijk [Des. Codes Cryptogr. 15 (199...
Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
Secret-sharing share size monotone span program
2017/9/28
A secret-sharing scheme realizes the forbidden graph access structure determined by a graph G=(V,E)G=(V,E) if a pair of vertices can reconstruct the secret if and only if it is an edge in GG. Secret-s...
Security of Linear Secret-Sharing Schemes against Mass Surveillance
linear secret-sharing algorithm-substitution attack mass surveillance
2015/12/29
Following the line of work presented recently by Bellare, Paterson
and Rogaway, we formalize and investigate the resistance of linear
secret-sharing schemes to mass surveillance. This primitive is w...
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions
Linear Secret Sharing Schemes Linear Time Sharing Robust Secret Sharing
2015/12/21
A linear near-threshold secret sharing scheme with both linear time sharing and reconstruction
algorithms and large secrets (i.e. secrets of size Ω(n)). Thus, the computational overhead per
sh...
Lower Bounds on the Information Ratio of Linear Secret Sharing Schemes
cryptographic protocols secet sharing linear secret sharing schemes
2013/2/21
Superpolynomial lower bounds on the average information ratio of linear secret sharing scheme are presented in this note for the first time. The previously known superpolynomial lower bounds applied o...
On codes, matroids and secure multi-party computation from linear secret sharing schemes
Multi-party computation multiplicative linear secret sharing schemes efficient error correction.
2009/3/27
Error correcting codes and matroids have been widely used in the study of ordinary secret
sharing schemes. In this paper, we study the connections between codes, matroids, and a special
class of sec...