all InfoSec news
Traceable Secret Sharing Based on the Chinese Remainder Theorem
May 27, 2024, 2:24 a.m. |
IACR News www.iacr.org
ePrint Report: Traceable Secret Sharing Based on the Chinese Remainder Theorem
Charlotte Hoffmann
Traceable threshold secret sharing schemes, introduced by Goyal, Song and Srinivasan (CRYPTO'21), allow to provably trace leaked shares to the parties that leaked them. The authors give the first definition and construction of traceable secret sharing schemes. However, the size of the shares in their construction are quadratic in the size of the secret. Boneh, Partap and Rotem (CRYPTO'24) recently proposed a new definition of traceable secret …
authors chinese construction crypto definition eprint report leaked parties report secret sharing song threshold trace traceable
More from www.iacr.org / IACR News
Jobs in InfoSec / Cybersecurity
Sr. Splunk Engineer | Remote, USA
@ Optiv | Illinois
DevSecOps Engineer
@ Johnson Controls | Johnson Controls (I) CoEE,Pune
DevSecOps Engineer- Mobile Solutions
@ ZF Friedrichshafen AG | Chennai, TN, IN, 600116
Penetration Testing Principal Consultant
@ Horangi | Thailand
Penetration Testing Team Lead - SG
@ Horangi | Singapore
Penetration Testing Engineer III
@ Boliden | (USA) AR BENTONVILLE Home Office ISD Office - DGTC