2003
DOI: 10.1007/978-3-540-24582-7_12
|View full text |Cite
|
Sign up to set email alerts
|

On the Power of Computational Secret Sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2006
2006
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(23 citation statements)
references
References 9 publications
0
23
0
Order By: Relevance
“…Another non-linear construction of secret-sharing schemes is an unpublished result of Yao [69] (see also [67]). Yao showed that if an access structure can be described by a small monotone circuit, then it has an efficient computational secret-sharing scheme.…”
Section: Summary and Open Problemsmentioning
confidence: 99%
“…Another non-linear construction of secret-sharing schemes is an unpublished result of Yao [69] (see also [67]). Yao showed that if an access structure can be described by a small monotone circuit, then it has an efficient computational secret-sharing scheme.…”
Section: Summary and Open Problemsmentioning
confidence: 99%
“…A somewhat different approach to formalizing CSS is given by Cachin [14] and refined by Vinod et al [51]. For privacy one requires that the probability that an adversary can guess the shared secret is negligible (in the security parameterized, which is again the length of the secret).…”
Section: Krawczyk (1993) and Othersmentioning
confidence: 99%
“…Robustness is then added-on using a hash-function-based technique that Krawczyk introduced in a separate paper [32]. Follow-on work to Krawczyk's paper has mostly focused on doing CSS for more general access structures [1,14,34,51].…”
Section: Introductionmentioning
confidence: 99%
“…This is done using a computational scheme of Yao [23] realizing the access structures which have polynomial-size monotone circuits. This scheme was never published; a description of the scheme has recently appeared in [20]. …”
Section: Secret Sharing For Weighted Threshold Access Structuresmentioning
confidence: 99%