Non-malleable codes

S Dziembowski, K Pietrzak, D Wichs - Journal of the ACM (JACM), 2018 - dl.acm.org
We introduce the notion of “non-malleable codes” which relaxes the notion of error
correction and error detection. Informally, a code is non-malleable if the message contained …

Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors

R Cramer, Y Dodis, S Fehr, C Padró… - … Conference on the Theory …, 2008 - Springer
Consider an abstract storage device Σ(G) that can hold a single element x from a fixed,
publicly known finite group G. Storage is private in the sense that an adversary does not …

Algebraic manipulation detection codes

R Cramer, S Fehr, C Padró - Science China Mathematics, 2013 - Springer
Algebraic manipulation detection codes are a cryptographic primitive that was introduced by
Cramer et al.(Eurocrypt 2008). It encompasses several methods that were previously used in …

Information-theoretic security without an honest majority

A Broadbent, A Tapp - Advances in Cryptology–ASIACRYPT 2007: 13th …, 2007 - Springer
We present six multiparty protocols with information-theoretic security that tolerate an
arbitrary number of corrupt participants. All protocols assume pairwise authentic private …

Unconditionally-secure robust secret sharing with compact shares

A Cevallos, S Fehr, R Ostrovsky, Y Rabani - … International Conference on …, 2012 - Springer
We consider the problem of reconstructing a shared secret in the presence of faulty shares,
with unconditional security. We require that any t shares give no information on the shared …

Approximate quantum error-correcting codes and secret sharing schemes

C Crépeau, D Gottesman, A Smith - … on the Theory and Applications of …, 2005 - Springer
It is a standard result in the theory of quantum error-correcting codes that no code of length n
can fix more than n/4 arbitrary errors, regardless of the dimension of the coding and …

On the cost of reconstructing a secret, or VSS with optimal reconstruction phase

R Cramer, I Damgård, S Fehr - Annual International Cryptology …, 2001 - Springer
Consider a scenario where an l-bit secret has been distributed among n players by an
honest dealer using some secret sharing scheme. Then, if all players behave honestly, the …

Nearly optimal robust secret sharing

M Cheraghchi - Designs, Codes and Cryptography, 2019 - Springer
We prove that a known general approach to improve Shamir's celebrated secret sharing
scheme; ie, adding an information-theoretic authentication tag to the secret, can make it …

(k,n) secret image sharing scheme capable of cheating detection

YX Liu, QD Sun, CN Yang - EURASIP Journal on Wireless …, 2018 - Springer
In a (k, n) threshold secret image sharing scheme, a secret image is encrypted into n image-
shadows that satisfy the following:(1) any less than k image-shadows get no information on …

Design of strongly secure communication and computation channels by nonlinear error detecting codes

M Karpovsky, Z Wang - IEEE Transactions on Computers, 2013 - ieeexplore.ieee.org
The security of communication or computational systems protected by traditional error
detecting codes rely on the assumption that the information bits of the message (output of …