Succinct computational secret sharing

B Applebaum, A Beimel, Y Ishai, E Kushilevitz… - Proceedings of the 55th …, 2023 - dl.acm.org
A secret-sharing scheme enables a dealer to share a secret s among n parties such that
only authorized subsets of parties, specified by a monotone access structure f:{0, 1} n→{0 …

Upslices, Downslices, and Secret-Sharing with Complexity of

B Applebaum, O Nir - Advances in Cryptology–CRYPTO 2021: 41st …, 2021 - Springer
A secret-sharing scheme allows to distribute a secret s among n parties such that only some
predefined “authorized” sets of parties can reconstruct the secret, and all other …

Secret-sharing schemes for high slices

A Beimel, O Farràs, O Lasri, O Nir - Theory of Cryptography Conference, 2025 - Springer
In a secret-sharing scheme, a secret is shared among n parties such that the secret can be
recovered by authorized coalitions, while it should be kept hidden from unauthorized …

Simplified PIR and CDS protocols and improved linear secret-sharing schemes

B Alon, A Beimel, O Lasri - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We consider 3 related cryptographic primitives, private information retrieval (PIR) protocols,
conditional disclosure of secrets (CDS) protocols, and secret-sharing schemes; these …

Secret sharing, slice formulas, and monotone real circuits

B Applebaum, A Beimel, O Nir, N Peter… - 13th Innovations in …, 2022 - drops.dagstuhl.de
A secret-sharing scheme allows to distribute a secret s among n parties such that only some
predefined" authorized" sets of parties can reconstruct the secret s, and all other" …

Lower bounds for secret-sharing schemes for k-hypergraphs

A Beimel - … on Information-Theoretic Cryptography (ITC 2023), 2023 - drops.dagstuhl.de
A secret-sharing scheme enables a dealer, holding a secret string, to distribute shares to
parties such that only pre-defined authorized subsets of parties can reconstruct the secret …

SPRINKLER: A Multi-RPL Man-in-the-Middle Identification Scheme in IoT Networks

A Zilberman, A Dvir, A Stulman - IEEE Transactions on Mobile …, 2024 - ieeexplore.ieee.org
Cyber-threat protection is one of the most challenging research branches of Internet-of-
Things (iot). With the exponential increase of tiny connected devices, the battle between …

Quadratic secret sharing and conditional disclosure of secrets

A Beimel, H Othman, N Peter - … in Cryptology–CRYPTO 2021: 41st Annual …, 2021 - Springer
There is a huge gap between the upper and lower bounds on the share size of secret-
sharing schemes for arbitrary n-party access structures, and consistent with our current …

Reducing the share size of weighted threshold secret sharing schemes via chow parameters approximation

O Farràs, M Guiot - Theory of Cryptography Conference, 2025 - Springer
Reducing the Share Size of Weighted Threshold Secret Sharing Schemes via Chow
Parameters Approximation | SpringerLink Skip to main content Advertisement Springer …

Advisor-Verifier-Prover Games and the Hardness of Information Theoretic Cryptography

B Applebaum, O Nir - 2023 IEEE 64th Annual Symposium on …, 2023 - ieeexplore.ieee.org
A major open problem in information-theoretic cryptography is to obtain a super-polynomial
lower bound for the communication complexity of basic cryptographic tasks. This question is …