{"id":"https://openalex.org/W3208593175","doi":"https://doi.org/10.1109/tit.2021.3123692","title":"Communication Efficient Secret Sharing With Small Share Size","display_name":"Communication Efficient Secret Sharing With Small Share Size","publication_year":2021,"publication_date":"2021-10-29","ids":{"openalex":"https://openalex.org/W3208593175","doi":"https://doi.org/10.1109/tit.2021.3123692","mag":"3208593175"},"language":"en","primary_location":{"id":"doi:10.1109/tit.2021.3123692","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2021.3123692","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101551013","display_name":"Jian Ding","orcid":"https://orcid.org/0000-0001-8788-1418"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jian Ding","raw_affiliation_strings":["College of Computer and Cyber Security and Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","State Key Laboratory of Cryptology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security and Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079564012","display_name":"Changlu Lin","orcid":"https://orcid.org/0000-0002-2868-3398"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changlu Lin","raw_affiliation_strings":["School of Mathematics and Statistics, the Fujian Provincial Key Laboratory of Network Security and Cryptology, and the Center for Applied Mathematics of Fujian Province, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Statistics, the Fujian Provincial Key Laboratory of Network Security and Cryptology, and the Center for Applied Mathematics of Fujian Province, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090841998","display_name":"Huaxiong Wang","orcid":"https://orcid.org/0000-0002-7669-8922"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Huaxiong Wang","raw_affiliation_strings":["School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019628468","display_name":"Chaoping Xing","orcid":"https://orcid.org/0000-0002-1257-1033"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chaoping Xing","raw_affiliation_strings":["School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101551013"],"corresponding_institution_ids":["https://openalex.org/I111753288","https://openalex.org/I4210132990"],"apc_list":null,"apc_paid":null,"fwci":1.3996,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.85234322,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"68","issue":"1","first_page":"659","last_page":"669"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.7107574939727783},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.6162756681442261},{"id":"https://openalex.org/keywords/notation","display_name":"Notation","score":0.5973055958747864},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5329984426498413},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4970138370990753},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.4868118464946747},{"id":"https://openalex.org/keywords/shared-secret","display_name":"Shared secret","score":0.45103535056114197},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.42434489727020264},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.41406774520874023},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.38055235147476196},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.34600159525871277},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.3126802444458008},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2737082242965698},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.12899664044380188}],"concepts":[{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.7107574939727783},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.6162756681442261},{"id":"https://openalex.org/C45357846","wikidata":"https://www.wikidata.org/wiki/Q2001982","display_name":"Notation","level":2,"score":0.5973055958747864},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5329984426498413},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4970138370990753},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.4868118464946747},{"id":"https://openalex.org/C184660509","wikidata":"https://www.wikidata.org/wiki/Q462624","display_name":"Shared secret","level":3,"score":0.45103535056114197},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.42434489727020264},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.41406774520874023},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.38055235147476196},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34600159525871277},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3126802444458008},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2737082242965698},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.12899664044380188},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tit.2021.3123692","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2021.3123692","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1681705846","display_name":null,"funder_award_id":"RG12/19","funder_id":"https://openalex.org/F4320320751","funder_display_name":"Ministry of Education - Singapore"},{"id":"https://openalex.org/G3452697306","display_name":null,"funder_award_id":"12031011","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5456709954","display_name":null,"funder_award_id":"RG21/18(S)","funder_id":"https://openalex.org/F4320320751","funder_display_name":"Ministry of Education - Singapore"},{"id":"https://openalex.org/G6957625712","display_name":null,"funder_award_id":"61572132","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7882990009","display_name":null,"funder_award_id":"U1705264","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8276841517","display_name":null,"funder_award_id":"2019J01275","funder_id":"https://openalex.org/F4320321878","funder_display_name":"Natural Science Foundation of Fujian Province"}],"funders":[{"id":"https://openalex.org/F4320320751","display_name":"Ministry of Education - Singapore","ror":"https://ror.org/01kcva023"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321878","display_name":"Natural Science Foundation of Fujian Province","ror":null},{"id":"https://openalex.org/F4320322999","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1534695542","https://openalex.org/W1641218312","https://openalex.org/W2006453614","https://openalex.org/W2080911030","https://openalex.org/W2141420453","https://openalex.org/W2156704793","https://openalex.org/W2167046508","https://openalex.org/W2535290256","https://openalex.org/W2613593521","https://openalex.org/W2731854684","https://openalex.org/W2742508417","https://openalex.org/W2752444925","https://openalex.org/W2902882503","https://openalex.org/W2962858508","https://openalex.org/W2963007332","https://openalex.org/W2964350992","https://openalex.org/W2970097841","https://openalex.org/W4206775542","https://openalex.org/W6743647307"],"related_works":["https://openalex.org/W2768332800","https://openalex.org/W2032053269","https://openalex.org/W2017188409","https://openalex.org/W2995280283","https://openalex.org/W2188298058","https://openalex.org/W2293995972","https://openalex.org/W2187591004","https://openalex.org/W4328132745","https://openalex.org/W2127077780","https://openalex.org/W139227235"],"abstract_inverted_index":{"Communication":[0],"efficient":[1,351],"secret":[2,34,120,148,192],"sharing":[3],"(CESS)":[4],"schemes":[5,11,65,107,177,197,253,273,280,323],"are":[6,123,198,292,324,346],"a":[7,27,52,81,115,124,142,172,199,205,224,230,296,306,362],"class":[8],"of":[9,24,41,60,100,144,146,162,164,178,195,204,219,229,233,254,268,321,389],"threshold":[10,64,358],"that":[12,47,66,118,250,366],"aim":[13],"to":[14,31,57,158,241,244,348],"minimize":[15],"the":[16,21,33,36,42,48,58,68,132,138,147,165,242,246,251,266,319,384,387],"so-called":[17],"decoding":[18,49,72,276,370],"bandwidth,":[19],"namely":[20],"necessary":[22],"amount":[23],"communication":[25,350],"between":[26],"combiner":[28,139,243],"who":[29],"wants":[30],"reconstruct":[32,141,159,245],"and":[35,74,121,151,180,193,216,305,372],"available":[37,61,101,269,390],"participants":[38,391],"storing":[39],"shares":[40],"secret.":[43,166,247],"Previous":[44],"works":[45],"proved":[46],"bandwidth":[50,371],"had":[51],"tight":[53],"lower":[54,69],"bound":[55,70],"related":[56],"number":[59,83,89,267,388],"participants.":[62,102],"Some":[63],"achieved":[67],"(optimal":[71],"bandwidth)":[73],"optimal":[75,369,373],"information":[76,374],"rate":[77,375],"were":[78],"constructed":[79],"for":[80,175,328,376],"given":[82,329],"(non-universal":[84],"case)":[85,99],"or":[86],"multiple":[87,127],"distinct":[88],"(":[90],"<inline-formula":[91,181,208,234,299,310,330,352],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[92,134,182,201,209,226,235,283,300,311,326,331,353,378],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[93,183,210,236,301,312,332,354],"<tex-math":[94,184,211,237,302,313,333,355],"notation=\"LaTeX\">$\\triangle":[95,185],"$":[96,186],"</tex-math></inline-formula>":[97,187,214,240,304,316,336,357],"-universal":[98,188],"However,":[103],"all":[104],"those":[105],"CESS":[106,176,252,259,339],"have":[108,114,261,281],"large":[109],"share":[110,122,194,285],"sizes.":[111],"Moreover,":[112],"they":[113],"common":[116],"feature":[117],"each":[119,191,217],"vector":[125],"with":[126],"coordinates,":[128],"which":[129,291],"results":[130],"in":[131],"<italic":[133,200,225,282,325,377],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">decoding":[135],"delay</i>":[136],"since":[137],"must":[140],"part":[143,161],"coordinates":[145,154,163],"at":[149],"first,":[150],"these":[152],"recovered":[153],"will":[155],"be":[156],"used":[157,347],"another":[160],"In":[167,341],"this":[168,255],"work,":[169],"we":[170,360],"describe":[171],"new":[173],"construction":[174],"non-universal":[179],"cases,":[189],"whereas":[190],"our":[196,272,279,322,344],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">single</i>":[202,227],"element":[203,228],"finite":[206],"field":[207,309],"notation=\"LaTeX\">$\\mathbb":[212,238,314,334],"{F}_{q^{e}}$":[213,239],",":[215,382],"participant":[218],"an":[220,262],"authorized":[221],"subset":[222],"provides":[223],"same":[231],"subfield":[232],"We":[248],"find":[249],"type,":[256],"termed":[257],"balanced":[258,338],"schemes,":[260,359],"inevitable":[263],"restriction":[264,385],"on":[265,386],"participants,":[270],"but":[271],"has":[274],"no":[275],"delay.":[277],"Furthermore,":[278],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">smaller</i>":[284],"sizes":[286],"than":[287],"other":[288],"existing":[289],"works,":[290],"realized":[293],"by":[294],"using":[295],"smaller":[297,307],"sub-packetization":[298],"notation=\"LaTeX\">$e$":[303],"base":[308],"{F}_{q}$":[315,335],".":[317],"Indeed,":[318],"sub-packetizations":[320],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">minimum</i>":[327],"among":[337],"schemes.":[340],"addition,":[342],"when":[343],"constructions":[345],"generate":[349],"notation=\"LaTeX\">$(n,r)$":[356],"derive":[361],"generalized":[363],"Shamir\u2019s":[364],"scheme":[365],"universally":[367],"achieves":[368],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">the":[379],"first":[380],"time</i>":[381],"where":[383],"is":[392],"removed.":[393]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
