{"id":"https://openalex.org/W7092627702","doi":"https://doi.org/10.1109/isit63088.2025.11195566","title":"Anonymous Shamir's Secret Sharing via Reed-Solomon Codes Against Permutations, Insertions, and Deletions","display_name":"Anonymous Shamir's Secret Sharing via Reed-Solomon Codes Against Permutations, Insertions, and Deletions","publication_year":2025,"publication_date":"2025-06-22","ids":{"openalex":"https://openalex.org/W7092627702","doi":"https://doi.org/10.1109/isit63088.2025.11195566"},"language":null,"primary_location":{"id":"doi:10.1109/isit63088.2025.11195566","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit63088.2025.11195566","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Roni Con","orcid":null},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Roni Con","raw_affiliation_strings":["Technion - Israel Institute of Technology,Department of Computer Science,Haifa,Israel"],"affiliations":[{"raw_affiliation_string":"Technion - Israel Institute of Technology,Department of Computer Science,Haifa,Israel","institution_ids":["https://openalex.org/I174306211"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I174306211"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.7822936,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8033000230789185,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8033000230789185,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.05620000138878822,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.020800000056624413,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.748199999332428},{"id":"https://openalex.org/keywords/code-word","display_name":"Code word","score":0.7473999857902527},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5303999781608582},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5077000260353088},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.4964999854564667},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.4805000126361847},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.41670000553131104},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.39500001072883606}],"concepts":[{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.748199999332428},{"id":"https://openalex.org/C153207627","wikidata":"https://www.wikidata.org/wiki/Q863873","display_name":"Code word","level":3,"score":0.7473999857902527},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5303999781608582},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5077000260353088},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.5026999711990356},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.4964999854564667},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.4805000126361847},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4675999879837036},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4503999948501587},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.41670000553131104},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.39500001072883606},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.38749998807907104},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3666999936103821},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3637999892234802},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.33320000767707825},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.3312000036239624},{"id":"https://openalex.org/C167927819","wikidata":"https://www.wikidata.org/wiki/Q1930567","display_name":"Shuffling","level":2,"score":0.3163999915122986},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.3111000061035156},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.31029999256134033},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.2867000102996826},{"id":"https://openalex.org/C2778950925","wikidata":"https://www.wikidata.org/wiki/Q4672474","display_name":"Access structure","level":4,"score":0.2646999955177307},{"id":"https://openalex.org/C3020028006","wikidata":"https://www.wikidata.org/wiki/Q9158","display_name":"Electronic mail","level":2,"score":0.263700008392334},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.25949999690055847},{"id":"https://openalex.org/C184660509","wikidata":"https://www.wikidata.org/wiki/Q462624","display_name":"Shared secret","level":3,"score":0.25440001487731934},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.25060001015663147}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit63088.2025.11195566","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit63088.2025.11195566","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.47872039675712585}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W51265332","https://openalex.org/W162344607","https://openalex.org/W1510640641","https://openalex.org/W1562076531","https://openalex.org/W1599026900","https://openalex.org/W1968245619","https://openalex.org/W1970797085","https://openalex.org/W2015965749","https://openalex.org/W2064750718","https://openalex.org/W2076095404","https://openalex.org/W2080132708","https://openalex.org/W2090759086","https://openalex.org/W2125870772","https://openalex.org/W2141420453","https://openalex.org/W2148575324","https://openalex.org/W2742107201","https://openalex.org/W3030897411","https://openalex.org/W3126358592","https://openalex.org/W3135989042","https://openalex.org/W3145823438","https://openalex.org/W3199052144","https://openalex.org/W4319996528","https://openalex.org/W4379984077","https://openalex.org/W4394711581","https://openalex.org/W4396754394","https://openalex.org/W4398150888","https://openalex.org/W4413461404","https://openalex.org/W4415284262"],"related_works":[],"abstract_inverted_index":{"In":[0,80,100],"this":[1,101,216],"work,":[2,102],"we":[3,103,143],"study":[4],"the":[5,16,19,33,53,56,62,68,82,92,95,106,119,126,167,180,185,212,224,227,233,244],"performance":[6],"of":[7,18,55,70,74,84,94,187,218,226],"ReedSolomon":[8],"codes":[9,110,157],"against":[10,114,161],"an":[11,115,162],"adversary":[12,116,163],"that":[13,111,117,138,145,158,164,198],"first":[14,104],"permutes":[15,118,166],"symbols":[17,124],"codeword":[20,120,128,168],"and":[21,25,66,78,121,169,177],"then":[22,122,170],"performs":[23,171],"insertions":[24,176],"deletions.":[26],"This":[27,183],"adversarial":[28],"model":[29],"is":[30,64,199],"motivated":[31],"by":[32],"recent":[34],"interest":[35],"in":[36],"fully":[37,44,140,200],"anonymous":[38,45],"secret-sharing":[39,46,136],"schemes":[40,137],"[1],":[41],"[2].":[42],"A":[43],"scheme":[47,197],"has":[48],"two":[49],"key":[50],"properties:":[51],"(1)":[52],"identities":[54,225],"participants":[57,75,96],"are":[58,76,112,139,151,159],"not":[59],"revealed":[60],"before":[61],"secret":[63,195,245],"reconstructed,":[65],"(2)":[67],"shares":[69,83,208,219,241],"any":[71,85,204,236],"unauthorized":[72,86],"set":[73,217],"uniform":[77],"independent.":[79],"particular,":[81],"subset":[87],"reveal":[88,209],"no":[89,221],"information":[90,222],"about":[91,211,223],"identity":[93],"who":[97,229],"hold":[98,230],"them.":[99,231],"make":[105],"following":[107],"observation:":[108],"Reed-Solomon":[109,156],"robust":[113,160],"deletes":[123],"from":[125],"permuted":[127,181],"can":[129,242],"be":[130],"used":[131],"to":[132,179],"construct":[133],"ramp":[134,194],"threshold":[135],"anonymous.":[141,201],"Then,":[142],"show":[144],"over":[146],"large":[147],"enough":[148],"fields,":[149],"there":[150],"<tex":[152,172,205,237],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[153,173,190,206,238],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$[n,":[154],"k]$</tex>":[155],"arbitrarily":[165],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$n-2":[174],"k+1$</tex>":[175],"deletions":[178],"codeword.":[182],"implies":[184],"existence":[186],"a":[188],"(<tex":[189],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$k-1,2":[191],"k-1,":[192],"n$</tex>)":[193],"sharing":[196],"That":[202],"is,":[203],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$k-1$</tex>":[207],"nothing":[210],"secret,":[213],"and,":[214],"moreover,":[215],"reveals":[220],"players":[228],"On":[232],"other":[234],"hand,":[235],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$2":[239],"k-1$</tex>":[240],"reconstruct":[243],"without":[246],"revealing":[247],"their":[248],"identities.":[249]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-21T00:00:00"}
