Optimal uniform secret sharing
M Yoshida, T Fujiwara… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
… about the secret. We refer to schemes with such uniform access structures as uniform secret
sharing… We first derive a tight lower bound for share entropy and then present an optimal …
sharing… We first derive a tight lower bound for share entropy and then present an optimal …
Optimal non-perfect uniform secret sharing schemes
… Our main result is to determine the optimal information ratio of the uniform access functions.
… of linear secret sharing schemes with optimal information ratio for the rational uniform access …
… of linear secret sharing schemes with optimal information ratio for the rational uniform access …
Secret-sharing schemes for general and uniform access structures
… study secret-sharing schemes for uniform access structures. An access structure is k-uniform
if … By counting arguments, our construction is optimal (up to polynomial factors). Previously, …
if … By counting arguments, our construction is optimal (up to polynomial factors). Previously, …
On the Power of Amortization in Secret Sharing: d-Uniform Secret Sharing and CDS with Constant Information Rate
B Applebaum, B Arkis - ACM Transactions on Computation Theory …, 2020 - dl.acm.org
… [31] provides an optimal solution since each party gets a share whose … share size (in bits)
of linear d-uniform secret sharing. This immediately implies a similar lower bound on the share …
of linear d-uniform secret sharing. This immediately implies a similar lower bound on the share …
Better secret sharing via robust conditional disclosure of secrets
… We start the analysis by sampling a partition Π with uniform distribution. We first focus on a
single block i, and denote by Yj,i the indicator random variable that is equal to 1 if and only if …
single block i, and denote by Yj,i the indicator random variable that is equal to 1 if and only if …
Communication efficient secret sharing
… is uniformly tight by designing a secret sharing scheme that achieves the optimal decoding
… We construct another secret sharing scheme that achieves the optimal decoding bandwidth …
… We construct another secret sharing scheme that achieves the optimal decoding bandwidth …
[HTML][HTML] Nearly optimal robust secret sharing
M Cheraghchi - Designs, Codes and Cryptography, 2019 - Springer
… and then samples a uniformly random univariate polynomial of … is amended with t uniformly
random and independent elements … that is generally sought after for secret sharing schemes. …
random and independent elements … that is generally sought after for secret sharing schemes. …
On the information rate of perfect secret sharing schemes
M Van Dijk - Designs, codes and cryptography, 1995 - Springer
… Let the secret be uniformly taken from S (we call S uniformly distributed). Then there exists a
… to papers in which perfect secret sharing schemes attaining the optimal information rate are …
… to papers in which perfect secret sharing schemes attaining the optimal information rate are …
Distributed multi-user secret sharing
M Soleymani, H Mahdavifar - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
… SO offers a better encoding complexity and latency than the one with optimal SO, as we will
se later in … and uniformly at random from Fq. Then the polynomial PjpXq is constructed as …
se later in … and uniformly at random from Fq. Then the polynomial PjpXq is constructed as …
Optimal linear multiparty conditional disclosure of secrets protocols
A Beimel, N Peter - Advances in Cryptology–ASIACRYPT 2018: 24th …, 2018 - Springer
… Thus, our results imply the existence of linear secret-sharing schemes for uniform … k-uniform
access structure with n parties can be realized by a linear secret-sharing scheme with share …
access structure with n parties can be realized by a linear secret-sharing scheme with share …
Related searches
- secret sharing schemes
- robust secret sharing
- distributed secret sharing
- communication efficient secret sharing
- distributed multi-user secret sharing
- threshold secret sharing
- non-perfect secret sharing
- general secret sharing
- space efficient secret sharing
- secret sharing circuit size barrier
- secret sharing access structures
- secret sharing optimal communication