May 27, 2024, 2:24 a.m. |

IACR News www.iacr.org

ePrint Report: Traceable Secret Sharing Based on the Chinese Remainder Theorem

Charlotte Hoffmann


Traceable threshold secret sharing schemes, introduced by Goyal, Song and Srinivasan (CRYPTO'21), allow to provably trace leaked shares to the parties that leaked them. The authors give the first definition and construction of traceable secret sharing schemes. However, the size of the shares in their construction are quadratic in the size of the secret. Boneh, Partap and Rotem (CRYPTO'24) recently proposed a new definition of traceable secret …

authors chinese construction crypto definition eprint report leaked parties report secret sharing song threshold trace traceable

Sr. Splunk Engineer | Remote, USA

@ Optiv | Illinois

DevSecOps Engineer

@ Johnson Controls | Johnson Controls (I) CoEE,Pune

DevSecOps Engineer- Mobile Solutions

@ ZF Friedrichshafen AG | Chennai, TN, IN, 600116

Penetration Testing Principal Consultant

@ Horangi | Thailand

Penetration Testing Team Lead - SG

@ Horangi | Singapore

Penetration Testing Engineer III

@ Boliden | (USA) AR BENTONVILLE Home Office ISD Office - DGTC