×
2019/06/04 · We focus on a simple local leakage model, where the adversary can apply an arbitrary function of a bounded output length to the secret state of ...
2021/02/09 · We show that additive secret sharing schemes and high-threshold instances of Shamir's secret sharing scheme are secure under local leakage ...
We show that additive secret sharing schemes and high-threshold instances of Shamir's secret sharing scheme are secure under local leakage attacks when the ...
It is shown that additive secret sharing schemes and high-threshold instances of Shamir's secret sharing scheme are secure under local leakage attacks when ...
We show that additive secret sharing schemes and high-threshold instances of Shamir's secret sharing scheme are secure under local leakage attacks when the ...
We show that additive secret sharing schemes and high-threshold instances of Shamir's secret sharing scheme are secure under local leakage attacks when the ...
Maji et al. [28] also proved that a random (linear) secret sharing scheme is leakage resilient to one-bit local leakage when t ≥ ...
On the Local Leakage Resilience of Linear Secret Sharing Schemes. https://doi.org/10.1007/s00145-021-09375-2. Journal: Journal of Cryptology, 2021, № 2.
Explore local leakage resilience in linear secret sharing schemes, examining theoretical foundations and practical implications for secure data ...