Intrusion-Resilient Secret Sharing
@article{Dziembowski2007IntrusionResilientSS, title={Intrusion-Resilient Secret Sharing}, author={Stefan Dziembowski and K. Pietrzak}, journal={48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07)}, year={2007}, pages={227-237} }
We introduce a new primitive called intrusion-resilient secret sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed interactively using low communication complexity in k, but not in k-1 rounds. IRSS is a means of sharing a secret message amongst a set of players which comes with a very strong security guarantee. The shares in an IRSS are made artificially large so that it is hard to retrieve them completely, and the reconstruction… CONTINUE READING
Topics from this paper
111 Citations
Leakage-Resilient Secret Sharing Against Colluding Parties
- Computer Science
- 2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS)
- 2019
- 10
- Highly Influenced
- PDF
Leakage Resilient Secret Sharing and Applications
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2018
- 21
- PDF
Key-Evolution Schemes Resilient to Space-Bounded Leakage
- Mathematics, Computer Science
- CRYPTO
- 2011
- 37
- PDF
Leakage-Resilient Cryptography in the Standard Model
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2008
- 11
- PDF
Leakage-Resilient Cryptography
- Computer Science
- 2008 49th Annual IEEE Symposium on Foundations of Computer Science
- 2008
- 478
- PDF
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
- Mathematics, Computer Science
- CRYPTO
- 2010
- 91
- PDF
References
SHOWING 1-10 OF 36 REFERENCES
Optimal Randomizer Efficiency in the Bounded-Storage
Model
- Computer Science, Mathematics
- Journal of Cryptology
- 2003
- 67
- PDF
Conditionally-perfect secrecy and a provably-secure randomized cipher
- Mathematics, Computer Science
- Journal of Cryptology
- 2004
- 254