This disclosure relates to generating shares of secret data represented by secret data elements based on a first threshold for the number of shares that allow determining the …
Motivated by applications in distributed storage, distributed computing, and homomorphic secret sharing, we study communication-efficient schemes for computing linear …
O Geil, S Martin, R Matsumoto… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Security of linear ramp secret sharing schemes can be characterized by the relative generalized Hamming weights of the involved codes. In this paper, we elaborate on the …
This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols. This survey analyzes existing work …
M Hayashi, S Song - IEEE Transactions on Information Theory, 2023 - ieeexplore.ieee.org
This paper unifiedly addresses two kinds of key quantum secure tasks, ie, quantum versions of secret sharing (SS) and symmetric private information retrieval (SPIR) by using multi …
This book offers a mathematical foundation for modern cryptography. It is primarily intended as an introduction for graduate students. Readers should have basic knowledge of …
Laser fault injection (LFI) attacks on cryptographic processor ICs are a critical threat to information systems. This paper proposes an IC-level integrated countermeasure employing …
CS Chum, X Zhang - Security and communication networks, 2013 - Wiley Online Library
Secret sharing schemes create an effective method to safeguard a secret by dividing it among several participants. By using hash functions and the herding hashes technique, we …
K Iwamura, AAAM Kamal - IEEE Access, 2025 - ieeexplore.ieee.org
When using an insecure communication channel, the initial step involves authenticating the user (verifying the other party) to ensure the legitimacy of the communication partner …