2017
DOI: 10.1007/978-3-319-70503-3_14
|View full text |Cite
|
Sign up to set email alerts
|

Near-Optimal Secret Sharing and Error Correcting Codes in $$\mathsf {AC}^0$$

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…As another example, our recent papers [12,18] built on the same line of work to resolve or nearly resolve a number of longstanding open questions in quantum query complexity. Finally, large-error and threshold degree lower bounds on AC 0 functions have recently proved instrumental in the development of cryptographic secret-sharing schemes with reconstruction procedures in AC 0 [7,8,19]. We thus believe that the new techniques developed in this article will find further applications, perhaps in unexpected areas.…”
Section: Introductionmentioning
confidence: 81%
See 1 more Smart Citation
“…As another example, our recent papers [12,18] built on the same line of work to resolve or nearly resolve a number of longstanding open questions in quantum query complexity. Finally, large-error and threshold degree lower bounds on AC 0 functions have recently proved instrumental in the development of cryptographic secret-sharing schemes with reconstruction procedures in AC 0 [7,8,19]. We thus believe that the new techniques developed in this article will find further applications, perhaps in unexpected areas.…”
Section: Introductionmentioning
confidence: 81%
“…The best previous results could only guarantee security against subsets of shares of size d = Θ(n 1/2 ), or could only guarantee reconstruction advantage bounded away from 1 [7,18]. Cheng et al [19] recently considered a relaxed notion of security, where even very small subsets of shares are allowed to provide (a bounded amount of) information about the secret bit b. Under this relaxed notion of security, they achieved perfect reconstruction and security against subsets of size Ω(n).…”
Section: Authorsmentioning
confidence: 99%
“…In [5,6], the secret is one bit. In [9], secrets of length equal to a fraction of N (number of players) is considered. This time binary secret sharing with adaptive and non-adaptive adversaries similar to the model we consider in this work is defined.…”
Section: Related Workmentioning
confidence: 99%