Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors

R Cramer, Y Dodis, S Fehr, C Padró… - … Conference on the Theory …, 2008 - Springer
Consider an abstract storage device Σ(G) that can hold a single element x from a fixed,
publicly known finite group G. Storage is private in the sense that an adversary does not …

[图书][B] RSA and public-key cryptography

RA Mollin - 2002 - taylorfrancis.com
Although much literature exists on the subject of RSA and public-key cryptography, until now
there has been no single source that reveals recent developments in the area at an …

Secure computation from random error correcting codes

H Chen, R Cramer, S Goldwasser, R De Haan… - … Conference on the …, 2007 - Springer
Secure computation consists of protocols for secure arithmetic: secret values are added and
multiplied securely by networked processors. The striking feature of secure computation is …

Linear secret sharing schemes from error correcting codes and universal hash functions

R Cramer, IB Damgård, N Döttling, S Fehr… - … Conference on the …, 2015 - Springer
We present a novel method for constructing linear secret sharing schemes (LSSS) from
linear error correcting codes and linear universal hash functions in a blackbox way. The …

ttPAKE: Typo tolerance password-authenticated key exchange

Y Han, C Xu, S Li, C Jiang, K Chen - Journal of Information Security and …, 2023 - Elsevier
Error tolerant password-authenticated key exchange (PAKE) allows a user to authenticate to
a server using a password and agree on a session key with the server, provided that the …

Evolving secret sharing: dynamic thresholds and robustness

I Komargodski, A Paskin-Cherniavsky - … , MD, USA, November 12-15, 2017 …, 2017 - Springer
Threshold secret sharing schemes enable a dealer to share a secret among n parties such
that only subsets of parties of cardinality at least k= k (n) k= k (n) can reconstruct the secret …

Correction of adversarial errors in networks

S Jaggi, M Langberg, T Ho… - … Symposium on Information …, 2005 - ieeexplore.ieee.org
We design codes to transmit information over a network, some subset of which is controlled
by a malicious adversary. The computationally unbounded, hidden adversary knows the …

Unconditionally-secure robust secret sharing with compact shares

A Cevallos, S Fehr, R Ostrovsky, Y Rabani - … International Conference on …, 2012 - Springer
We consider the problem of reconstructing a shared secret in the presence of faulty shares,
with unconditional security. We require that any t shares give no information on the shared …

Approximate quantum error-correcting codes and secret sharing schemes

C Crépeau, D Gottesman, A Smith - … on the Theory and Applications of …, 2005 - Springer
It is a standard result in the theory of quantum error-correcting codes that no code of length n
can fix more than n/4 arbitrary errors, regardless of the dimension of the coding and …

Nearly optimal robust secret sharing

M Cheraghchi - Designs, Codes and Cryptography, 2019 - Springer
We prove that a known general approach to improve Shamir's celebrated secret sharing
scheme; ie, adding an information-theoretic authentication tag to the secret, can make it …