Academic literature on the topic 'Leakage resilient secret sharing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Leakage resilient secret sharing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Leakage resilient secret sharing"
Dai, ShuGuang, JinFeng Wei, and FangGuo Zhang. "Memory leakage-resilient secret sharing schemes." Science China Information Sciences 58, no. 11 (2015): 1–9. http://dx.doi.org/10.1007/s11432-015-5385-8.
Full textLi, Ping, Shengjun Li, Hongyang Yan, Lishan Ke, Teng Huang, and Alzubair Hassan. "A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme." Complexity 2020 (March 13, 2020): 1–13. http://dx.doi.org/10.1155/2020/1784276.
Full textLabao, Alfonso, and Henry Adorna. "Cryptographic Rational Secret Sharing Schemes over General Networks." Cryptography 6, no. 4 (2022): 50. http://dx.doi.org/10.3390/cryptography6040050.
Full textMaitra, Arpita, and Goutam Paul. "A Resilient Quantum Secret Sharing Scheme." International Journal of Theoretical Physics 54, no. 2 (2014): 398–408. http://dx.doi.org/10.1007/s10773-014-2233-3.
Full textZhou, Yanwei, Bo Yang, Tao Wang, Zhe Xia, and Hongxia Hou. "Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings." Computer Journal 63, no. 4 (2019): 508–24. http://dx.doi.org/10.1093/comjnl/bxz085.
Full textGuo, Yuyan, Jiguo Li, Mingming Jiang, Lei Yu, and Shimin Wei. "Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model." Security and Communication Networks 2020 (June 28, 2020): 1–11. http://dx.doi.org/10.1155/2020/1492681.
Full textHuang, Jianye, Qiong Huang, and Chunhua Pan. "A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting." International Journal of Foundations of Computer Science 28, no. 06 (2017): 761–80. http://dx.doi.org/10.1142/s0129054117400172.
Full textTang, Fei, Hongda Li, Qihua Niu, and Bei Liang. "Secure Mobile Agent from Leakage-Resilient Proxy Signatures." Mobile Information Systems 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/901418.
Full textZhang, Yinghui, Pengzhen Lang, Dong Zheng, Menglei Yang, and Rui Guo. "A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience." Security and Communication Networks 2018 (June 24, 2018): 1–13. http://dx.doi.org/10.1155/2018/7202598.
Full textTseng, Yuh–Min, Jui-Di Wu, Sen-Shan Huang, and Tung-Tso Tsai. "Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server." Information Technology And Control 49, no. 4 (2020): 464–81. http://dx.doi.org/10.5755/j01.itc.49.4.25927.
Full textDissertations / Theses on the topic "Leakage resilient secret sharing"
Chen, Guan-Wei, and 陳冠瑋. "Near Optimal Secret Sharing and Defense Resource Allocation Plans for QoS Constrained Information Leakage Minimization." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/76650438020223405520.
Full textChen, Ding-Jie, and 陳鼎介. "An RST-Resilient Image Intellectual Property Protection Scheme Based on Fourier-Mellin Transform and Secret Sharing." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/13834369141719003666.
Full textBook chapters on the topic "Leakage resilient secret sharing"
Srinivasan, Akshayaram, and Prashant Nalini Vasudevan. "Leakage Resilient Secret Sharing and Applications." In Advances in Cryptology – CRYPTO 2019. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-26951-7_17.
Full textNielsen, Jesper Buus, and Mark Simkin. "Lower Bounds for Leakage-Resilient Secret Sharing." In Advances in Cryptology – EUROCRYPT 2020. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45721-1_20.
Full textDutta, Sabyasachi, and Reihaneh Safavi-Naini. "Leakage Resilient Cheating Detectable Secret Sharing Schemes." In Information Security and Privacy. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90567-5_1.
Full textMaji, Hemanta K., Anat Paskin-Cherniavsky, Tom Suad, and Mingyuan Wang. "Constructing Locally Leakage-Resilient Linear Secret-Sharing Schemes." In Advances in Cryptology – CRYPTO 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-84252-9_26.
Full textMaji, Hemanta K., Hai H. Nguyen, Anat Paskin-Cherniavsky, et al. "Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family." In Theory of Cryptography. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-22318-1_13.
Full textChandran, Nishanth, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, and Sruthi Sekar. "Short Leakage Resilient and Non-malleable Secret Sharing Schemes." In Advances in Cryptology – CRYPTO 2022. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-15802-5_7.
Full textLi, Ping, Jin Li, and Alzubair Hassan. "Group Identification via Non-threshold Leakage-Resilient Secret Sharing Scheme." In Cyberspace Safety and Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37352-8_20.
Full textChandran, Nishanth, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, and Sruthi Sekar. "Adaptive Extractors and Their Application to Leakage Resilient Secret Sharing." In Advances in Cryptology – CRYPTO 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-84252-9_20.
Full textXiong, Hao, Cong Zhang, Tsz Hon Yuen, Echo P. Zhang, Siu Ming Yiu, and Sihan Qing. "Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model." In Information and Communications Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34129-8_11.
Full textMaji, Hemanta K., Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, and Mingyuan Wang. "Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages." In Lecture Notes in Computer Science. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77886-6_12.
Full textConference papers on the topic "Leakage resilient secret sharing"
Kumar, Ashutosh, Raghu Meka, and Amit Sahai. "Leakage-Resilient Secret Sharing Against Colluding Parties." In 2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS). IEEE, 2019. http://dx.doi.org/10.1109/focs.2019.00045.
Full textAdams, Donald Q., Hemanta K. Maji, Hai H. Nguyen, et al. "Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks." In 2021 IEEE International Symposium on Information Theory (ISIT). IEEE, 2021. http://dx.doi.org/10.1109/isit45174.2021.9518230.
Full textMaji, Hemanta K., Hai H. Nguyen, Anat Paskin-Cherniavsky, and Mingyuan Wang. "Improved Bound on the Local Leakage-resilience of Shamir’s Secret Sharing." In 2022 IEEE International Symposium on Information Theory (ISIT). IEEE, 2022. http://dx.doi.org/10.1109/isit50566.2022.9834695.
Full textDziembowski, Stefan, and Krzysztof Pietrzak. "Intrusion-Resilient Secret Sharing." In 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07). IEEE, 2007. http://dx.doi.org/10.1109/focs.2007.4389495.
Full textDziembowski, Stefan, and Krzysztof Pietrzak. "Intrusion-Resilient Secret Sharing." In 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07). IEEE, 2007. http://dx.doi.org/10.1109/focs.2007.63.
Full textUkwandu, Elochukwu, William J. Buchanan, Lu Fan, Gordon Russell, and Owen Lo. "RESCUE: Resilient Secret Sharing Cloud-Based Architecture." In 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2015. http://dx.doi.org/10.1109/trustcom.2015.459.
Full textJuarez-Sandoval, Oswaldo, Atoany Fierro-Radilla, Angelina Espejel-Trujillo, Mariko Nakano-Miyatake, and Hector Perez-Meana. "Cropping and noise resilient steganography algorithm using secret image sharing." In Sixth International Conference on Graphic and Image Processing (ICGIP 2014), edited by Yulin Wang, Xudong Jiang, and David Zhang. SPIE, 2015. http://dx.doi.org/10.1117/12.2179745.
Full textLiu, Shenchuan, Masaaki Fujiyoshi, and Hitoshi Kiya. "A leakage suppressed two-level security visual secret sharing scheme." In 2011 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS 2011). IEEE, 2011. http://dx.doi.org/10.1109/ispacs.2011.6146169.
Full textAlmeida, Jose Bacelar, Manuel Barbosa, Gilles Barthe, Hugo Pacheco, Vitor Pereira, and Bernardo Portela. "Enforcing Ideal-World Leakage Bounds in Real-World Secret Sharing MPC Frameworks." In 2018 IEEE 31st Computer Security Foundations Symposium (CSF). IEEE, 2018. http://dx.doi.org/10.1109/csf.2018.00017.
Full textHsieh, Shang-Lin, Ding-Jie Chen, Bin-Yuan Huang, and I.-Ju Tsai. "An RST-resilient image copyright protection scheme based on the invariant domain and image secret sharing." In 2008 IEEE International Conference on Systems, Man and Cybernetics (SMC). IEEE, 2008. http://dx.doi.org/10.1109/icsmc.2008.4811422.
Full text