{"id":"https://openalex.org/W2898633823","doi":"https://doi.org/10.1007/s10623-018-0578-y","title":"Nearly optimal robust secret sharing","display_name":"Nearly optimal robust secret sharing","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W2898633823","doi":"https://doi.org/10.1007/s10623-018-0578-y","mag":"2898633823"},"language":"en","primary_location":{"id":"doi:10.1007/s10623-018-0578-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10623-018-0578-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10623-018-0578-y.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10623-018-0578-y.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002790246","display_name":"Mahdi Cheraghchi","orcid":"https://orcid.org/0000-0001-8957-0306"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Mahdi Cheraghchi","raw_affiliation_strings":["Department of Computing, Imperial College London, London, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Imperial College London, London, UK","institution_ids":["https://openalex.org/I47508984"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5002790246"],"corresponding_institution_ids":["https://openalex.org/I47508984"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":{"value":2290,"currency":"EUR","value_usd":2890},"fwci":0.6753,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.78144637,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"87","issue":"8","first_page":"1777","last_page":"1796"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.873970627784729},{"id":"https://openalex.org/keywords/shamirs-secret-sharing","display_name":"Shamir's Secret Sharing","score":0.5666888952255249},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.5592103600502014},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.5186325907707214},{"id":"https://openalex.org/keywords/algebraic-number","display_name":"Algebraic number","score":0.49493712186813354},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.49480217695236206},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.49224892258644104},{"id":"https://openalex.org/keywords/constant","display_name":"Constant (computer programming)","score":0.4723806381225586},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.4693751335144043},{"id":"https://openalex.org/keywords/security-parameter","display_name":"Security parameter","score":0.458479642868042},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4263603091239929},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.39083701372146606},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3854033648967743},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.28461384773254395},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.2621210813522339},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.20227214694023132}],"concepts":[{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.873970627784729},{"id":"https://openalex.org/C131755552","wikidata":"https://www.wikidata.org/wiki/Q935125","display_name":"Shamir's Secret Sharing","level":5,"score":0.5666888952255249},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.5592103600502014},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.5186325907707214},{"id":"https://openalex.org/C9376300","wikidata":"https://www.wikidata.org/wiki/Q168817","display_name":"Algebraic number","level":2,"score":0.49493712186813354},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.49480217695236206},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.49224892258644104},{"id":"https://openalex.org/C2777027219","wikidata":"https://www.wikidata.org/wiki/Q1284190","display_name":"Constant (computer programming)","level":2,"score":0.4723806381225586},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.4693751335144043},{"id":"https://openalex.org/C2776711565","wikidata":"https://www.wikidata.org/wiki/Q7445058","display_name":"Security parameter","level":3,"score":0.458479642868042},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4263603091239929},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.39083701372146606},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3854033648967743},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.28461384773254395},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.2621210813522339},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.20227214694023132},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s10623-018-0578-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10623-018-0578-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10623-018-0578-y.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:spiral.imperial.ac.uk:10044/1/65789","is_oa":true,"landing_page_url":"http://hdl.handle.net/10044/1/65789","pdf_url":null,"source":{"id":"https://openalex.org/S4306401396","display_name":"Spiral (Imperial College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I47508984","host_organization_name":"Imperial College London","host_organization_lineage":["https://openalex.org/I47508984"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"1796","raw_type":"Journal Article"}],"best_oa_location":{"id":"doi:10.1007/s10623-018-0578-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10623-018-0578-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10623-018-0578-y.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320283","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2898633823.pdf","grobid_xml":"https://content.openalex.org/works/W2898633823.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W32204006","https://openalex.org/W182801106","https://openalex.org/W1490273987","https://openalex.org/W1557415002","https://openalex.org/W1574535057","https://openalex.org/W1965492831","https://openalex.org/W1967771846","https://openalex.org/W2043769961","https://openalex.org/W2088023978","https://openalex.org/W2099035153","https://openalex.org/W2103930929","https://openalex.org/W2116018059","https://openalex.org/W2141420453","https://openalex.org/W2144007657","https://openalex.org/W2146078064","https://openalex.org/W2147549456","https://openalex.org/W2157602587","https://openalex.org/W2162725776","https://openalex.org/W2176748244","https://openalex.org/W2242315873","https://openalex.org/W2293080102","https://openalex.org/W2294388818","https://openalex.org/W2397857137","https://openalex.org/W2399214554","https://openalex.org/W2473929938","https://openalex.org/W2895239415","https://openalex.org/W2970097841","https://openalex.org/W3029698825","https://openalex.org/W4206748557"],"related_works":["https://openalex.org/W2079631812","https://openalex.org/W2023825511","https://openalex.org/W1504170878","https://openalex.org/W2368879407","https://openalex.org/W2146199240","https://openalex.org/W2356283120","https://openalex.org/W2163216853","https://openalex.org/W2392055741","https://openalex.org/W395932944","https://openalex.org/W2377292126"],"abstract_inverted_index":{"We":[0,115],"prove":[1],"that":[2,129,265],"a":[3,118,196,253,291],"known":[4,63],"general":[5],"approach":[6],"to":[7,20,94,195,296],"improve":[8],"Shamir\u2019s":[9,46,161],"celebrated":[10],"secret":[11,79,123,151,270],"sharing":[12,124,271],"scheme;":[13],"i.e.,":[14,231],"adding":[15],"an":[16,86,228],"information-theoretic":[17,83],"authentication":[18],"tag":[19,84,95],"the":[21,61,77,81,101,107,137,150,157,179,189,205,221,224,250,256,288,297],"secret,":[22],"can":[23,176,192,210,247,273],"make":[24],"it":[25],"robust":[26,50,122,278],"for":[27,38,51,67,113,240],"n":[28,108,209,217],"parties":[29,175],"against":[30],"any":[31,39,167,232],"collusion":[32],"of":[33,169,186,207,234,259,290],"size":[34,139],"$$\\delta":[35,41,53,172,201,235],"n$$":[36,173],",":[37,146,246],"constant":[40,197],"\\in":[42,54],"(0,":[43],"1/2)$$":[44],".":[45,56],"original":[47,298],"scheme":[48,125,166,222],"is":[49,92,130,141,149,156,218,262],"all":[52,134],"(0,1/3)$$":[55],"Beyond":[57],"that,":[58,72],"we":[59],"employ":[60],"best":[62],"list":[64],"decoding":[65],"algorithms":[66],"Reed-Solomon":[68,187],"codes":[69,184],"and":[70,121,153,293],"show":[71],"with":[73,282],"high":[74],"probability,":[75],"only":[76,286],"correct":[78,82],"maintains":[80],"if":[85],"algebraic":[87,182],"manipulation":[88],"detection":[89],"(AMD)":[90],"code":[91],"used":[93],"secrets.":[96],"This":[97],"result":[98,261],"holds":[99],"in":[100,105,126,133,163,227,263],"so-called":[102],"\u201cnon-rushing\u201d":[103],"model":[104,128],"which":[106,140],"shares":[109,208],"are":[110],"submitted":[111],"simultaneously":[112],"reconstruction.":[114],"thus":[116],"obtain":[117],"fully":[119],"explicit":[120],"this":[127,164,214],"essentially":[131,285],"optimal":[132],"parameters":[135],"including":[136],"share":[138,190],"$$k(1+o(1))":[142],"+":[143],"O(\\kappa":[144],")$$":[145,237],"where":[147],"k":[148],"length":[152,191],"$$\\kappa":[154],"$$":[155,202],"security":[158],"parameter.":[159],"Like":[160],"scheme,":[162],"modified":[165],"set":[168,233],"more":[170,277],"than":[171,279],"honest":[174,238],"efficiently":[177,248],"recover":[178],"secret.":[180,251],"Using":[181],"geometry":[183],"instead":[185],"codes,":[188],"be":[193,274],"decreased":[194],"(only":[198],"depending":[199],"on":[200],")":[203],"while":[204],"number":[206],"grow":[211],"independently.":[212],"In":[213],"case,":[215],"when":[216],"large":[219],"enough,":[220],"satisfies":[223],"\u201cthreshold\u201d":[225],"requirement":[226],"approximate":[229],"sense;":[230],"n(1+\\rho":[236],"parties,":[239],"arbitrarily":[241],"small":[242],"$$\\rho":[243],">":[244],"0$$":[245],"reconstruct":[249],"From":[252],"practical":[254],"perspective,":[255],"main":[257],"importance":[258],"our":[260],"showing":[264],"existing":[266],"systems":[267],"employing":[268],"Shamir-type":[269],"schemes":[272],"made":[275],"much":[276],"previously":[280],"thought":[281],"minimal":[283],"change,":[284],"involving":[287],"addition":[289],"short":[292],"simple":[294],"checksum":[295],"data.":[299]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2026-03-16T09:10:04.655348","created_date":"2025-10-10T00:00:00"}
