2017
DOI: 10.1007/978-3-319-63688-7_5
|View full text |Cite
|
Sign up to set email alerts
|

Be Adaptive, Avoid Overcommitting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(11 citation statements)
references
References 27 publications
0
11
0
Order By: Relevance
“…On the other hand, our schemes employ a secret sharing scheme where the number of shares corresponds to only the number of input wires. Their framework derives from the technique to prove the adaptive security of secret sharing for monotone circuits by Jafargholi et al [21], which requires the same number of shares as in KW19. We guess that this is why their construction employs such a secret sharing scheme.…”
Section: Number Of Sharesmentioning
confidence: 99%
See 2 more Smart Citations
“…On the other hand, our schemes employ a secret sharing scheme where the number of shares corresponds to only the number of input wires. Their framework derives from the technique to prove the adaptive security of secret sharing for monotone circuits by Jafargholi et al [21], which requires the same number of shares as in KW19. We guess that this is why their construction employs such a secret sharing scheme.…”
Section: Number Of Sharesmentioning
confidence: 99%
“…Here, we briefly recall the piecewise guessing framework by Kowalczyk and Wee [25], which is based on the framework by Jafargholi et al [21]. The framework helps us to prove adaptive security of cryptographic schemes that are selectively secure.…”
Section: Piecewise Guessing Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…We name our scheme S2. It combines the folklore idea of Yao's secret-sharing scheme [3,28,42] with Benaloh-and-Leichter's scheme for monotone formulas [16]. The reason we call Yao's scheme "folklore" is because there is no written description of it by him.…”
Section: B Base-level Scheme S2mentioning
confidence: 99%
“…Recently, Tomida et al [26] and Kowalczyk et al [27] proposed ABE schemes that address the problem of one-use restriction of attributes in access policy. e schemes were built on a piecewise guessing framework developed in [28], and they proved adaptive security of the ABE constructions with some polynomial security losses. Nonetheless, these schemes do not directly support span programs (linear secret sharing scheme matrix) to express policies.…”
Section: Related Workmentioning
confidence: 99%