Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Past month
  • Any time
  • Past hour
  • Past 24 hours
  • Past week
  • Past month
  • Past year
All results
May 10, 2024 · When m-1 shares are replaced, our scheme obtains an information rate of m/|S|, where S is the set of shares. This provides an improvement over the information ...
May 16, 2024 · Secret sharing allows a user to split a secret into many shares so that the secret can be recovered if, and only if, an authorized set of shares is collected.
May 7, 2024 · In this work (Section III), we propose a statistical leakage model for secret sharing schemes where the adversary leaks information from all secret shares ...
May 18, 2024 · The highest information rate achievable for a wiretap channel is ... secret sharing schemes. ... By nearly-threshold we mean a ramp scheme with arbitrarily small ...
6 days ago · We present a new approach to garbling arithmetic circuits using techniques from homomorphic secret sharing, obtaining constructions with high rate that support ...
May 22, 2024 · The Secret Sharing is a scheme for sharing data into n pieces using (k, n) threshold method. Secret Sharing becomes an efficient method to ensure secure data ...
May 6, 2024 · Most developed protocols use (n, n)-secret sharing schemes, where all n shares are required to reconstruct the secret. For most use cases, secret sharing would ...
May 22, 2024 · The secret sharing scheme based on Chinese Remainder Theorem (CRT) generates keys in integer domains due to the theoretical basis of elementary number theory, ...
May 8, 2024 · László Csirmaz, Gábor Tardos: Optimal information rate of secret sharing schemes on trees ...
3 days ago · The code can be viewed as an t -error tolerant secret sharing scheme. Since the code yields a small logical subspace using large registers that contain both ...