{"id":"https://openalex.org/W3160644793","doi":"https://doi.org/10.1109/tit.2022.3198407","title":"Leakage-Resilient Secret Sharing With Constant Share Size","display_name":"Leakage-Resilient Secret Sharing With Constant Share Size","publication_year":2022,"publication_date":"2022-08-15","ids":{"openalex":"https://openalex.org/W3160644793","doi":"https://doi.org/10.1109/tit.2022.3198407","mag":"3160644793"},"language":"en","primary_location":{"id":"doi:10.1109/tit.2022.3198407","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2022.3198407","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://dr.ntu.edu.sg/bitstream/10356/168032/2/Leakage-Resilient_Secret_Sharing_with_Constant_Share_Size.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065936838","display_name":"Ivan Tjuawinata","orcid":"https://orcid.org/0000-0002-4731-1426"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]},{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN","SG"],"is_corresponding":true,"raw_author_name":"Ivan Tjuawinata","raw_affiliation_strings":["Strategic Centre for Research on Privacy-Preserving Technologies and Systems, Nanyang Technological University, Jurong West, Singapore","School of Electronic Information and Electric Engineering, Shanghai Jiao Tong University, Shanghai, 200240 China","Nanyang Technological University, Singapore"],"raw_orcid":"https://orcid.org/0000-0002-4731-1426","affiliations":[{"raw_affiliation_string":"Strategic Centre for Research on Privacy-Preserving Technologies and Systems, Nanyang Technological University, Jurong West, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"School of Electronic Information and Electric Engineering, Shanghai Jiao Tong University, Shanghai, 200240 China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019628468","display_name":"Chaoping Xing","orcid":"https://orcid.org/0000-0002-1257-1033"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]},{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN","SG"],"is_corresponding":false,"raw_author_name":"Chaoping Xing","raw_affiliation_strings":["School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China","School of Electronic Information and Electric Engineering, Shanghai Jiao Tong University, Shanghai, 200240 China","Centre for Research on Privacy-Preserving Technologies and Systems, Nanyang Technological University, Singapore 637553","Nanyang Technological University, Singapore"],"raw_orcid":"https://orcid.org/0000-0002-1257-1033","affiliations":[{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"School of Electronic Information and Electric Engineering, Shanghai Jiao Tong University, Shanghai, 200240 China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Centre for Research on Privacy-Preserving Technologies and Systems, Nanyang Technological University, Singapore 637553","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5065936838"],"corresponding_institution_ids":["https://openalex.org/I172675005","https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.1387,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.50853702,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"68","issue":"12","first_page":"8228","last_page":"8250"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.8422441482543945},{"id":"https://openalex.org/keywords/concatenation","display_name":"Concatenation (mathematics)","score":0.7009915709495544},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.5612967610359192},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.49950504302978516},{"id":"https://openalex.org/keywords/algebraic-number","display_name":"Algebraic number","score":0.47820353507995605},{"id":"https://openalex.org/keywords/finite-field","display_name":"Finite field","score":0.44807058572769165},{"id":"https://openalex.org/keywords/prime","display_name":"Prime (order theory)","score":0.43989044427871704},{"id":"https://openalex.org/keywords/multiplicative-function","display_name":"Multiplicative function","score":0.4321572482585907},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.39602917432785034},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3799729347229004},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.22394785284996033},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.21919825673103333},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.15685269236564636}],"concepts":[{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.8422441482543945},{"id":"https://openalex.org/C87619178","wikidata":"https://www.wikidata.org/wiki/Q126002","display_name":"Concatenation (mathematics)","level":2,"score":0.7009915709495544},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.5612967610359192},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.49950504302978516},{"id":"https://openalex.org/C9376300","wikidata":"https://www.wikidata.org/wiki/Q168817","display_name":"Algebraic number","level":2,"score":0.47820353507995605},{"id":"https://openalex.org/C77926391","wikidata":"https://www.wikidata.org/wiki/Q603880","display_name":"Finite field","level":2,"score":0.44807058572769165},{"id":"https://openalex.org/C184992742","wikidata":"https://www.wikidata.org/wiki/Q7243229","display_name":"Prime (order theory)","level":2,"score":0.43989044427871704},{"id":"https://openalex.org/C42747912","wikidata":"https://www.wikidata.org/wiki/Q1048447","display_name":"Multiplicative function","level":2,"score":0.4321572482585907},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.39602917432785034},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3799729347229004},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22394785284996033},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.21919825673103333},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.15685269236564636},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tit.2022.3198407","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2022.3198407","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},{"id":"pmh:oai:dr.ntu.edu.sg:10356/168032","is_oa":true,"landing_page_url":"https://hdl.handle.net/10356/168032","pdf_url":"https://dr.ntu.edu.sg/bitstream/10356/168032/2/Leakage-Resilient_Secret_Sharing_with_Constant_Share_Size.pdf","source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"}],"best_oa_location":{"id":"pmh:oai:dr.ntu.edu.sg:10356/168032","is_oa":true,"landing_page_url":"https://hdl.handle.net/10356/168032","pdf_url":"https://dr.ntu.edu.sg/bitstream/10356/168032/2/Leakage-Resilient_Secret_Sharing_with_Constant_Share_Size.pdf","source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3452697306","display_name":null,"funder_award_id":"12031011","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5736169107","display_name":null,"funder_award_id":"2020YFA0712300","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320320671","display_name":"National Research Foundation","ror":"https://ror.org/05s0g1g46"},{"id":"https://openalex.org/F4320320709","display_name":"National Research Foundation Singapore","ror":"https://ror.org/03cpyc314"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W3160644793.pdf"},"referenced_works_count":74,"referenced_works":["https://openalex.org/W33721796","https://openalex.org/W174706587","https://openalex.org/W194315852","https://openalex.org/W1482576848","https://openalex.org/W1503056535","https://openalex.org/W1521692265","https://openalex.org/W1557415002","https://openalex.org/W1574535057","https://openalex.org/W1581614720","https://openalex.org/W1592625985","https://openalex.org/W1603601034","https://openalex.org/W1613874182","https://openalex.org/W1664187661","https://openalex.org/W1730634423","https://openalex.org/W1837145606","https://openalex.org/W1885156594","https://openalex.org/W1965492831","https://openalex.org/W1973454358","https://openalex.org/W1988374166","https://openalex.org/W1989431565","https://openalex.org/W1996118782","https://openalex.org/W2006453614","https://openalex.org/W2027471022","https://openalex.org/W2080911030","https://openalex.org/W2096024255","https://openalex.org/W2096290348","https://openalex.org/W2100265784","https://openalex.org/W2101915041","https://openalex.org/W2104494563","https://openalex.org/W2112138431","https://openalex.org/W2112963602","https://openalex.org/W2116926584","https://openalex.org/W2128846062","https://openalex.org/W2152924492","https://openalex.org/W2154909745","https://openalex.org/W2168970529","https://openalex.org/W2402235285","https://openalex.org/W2536058570","https://openalex.org/W2576288169","https://openalex.org/W2613593521","https://openalex.org/W2809607206","https://openalex.org/W2884229430","https://openalex.org/W2907243341","https://openalex.org/W2908383958","https://openalex.org/W2912577494","https://openalex.org/W2949384329","https://openalex.org/W2951150472","https://openalex.org/W2954297638","https://openalex.org/W2954626013","https://openalex.org/W2967582826","https://openalex.org/W3115268014","https://openalex.org/W4230099306","https://openalex.org/W4249844765","https://openalex.org/W6601219745","https://openalex.org/W6608016099","https://openalex.org/W6628671698","https://openalex.org/W6634281411","https://openalex.org/W6635090078","https://openalex.org/W6635520437","https://openalex.org/W6635969061","https://openalex.org/W6637061565","https://openalex.org/W6637580987","https://openalex.org/W6638697518","https://openalex.org/W6639610839","https://openalex.org/W6674490019","https://openalex.org/W6675052998","https://openalex.org/W6676878781","https://openalex.org/W6682554491","https://openalex.org/W6753854764","https://openalex.org/W6757572390","https://openalex.org/W6757583223","https://openalex.org/W6757691297","https://openalex.org/W6758317210","https://openalex.org/W6764687538"],"related_works":["https://openalex.org/W2002742191","https://openalex.org/W2940090557","https://openalex.org/W4299414921","https://openalex.org/W2964112523","https://openalex.org/W4311307183","https://openalex.org/W4225396397","https://openalex.org/W3160644793","https://openalex.org/W2921738083","https://openalex.org/W2466745091","https://openalex.org/W1581614720"],"abstract_inverted_index":{"In":[0,191,240],"this":[1,192],"work,":[2,193],"we":[3,73,213,256,286,320],"consider":[4,74],"the":[5,19,22,41,80,93,139,153,235,242,266,303,307,322],"leakage-resilience":[6,23,207,323],"of":[7,24,63,82,87,237,268,299,302,309,324,335,341],"algebraic-geometric":[8],"(AG":[9],"for":[10,179,247],"short)":[11],"codes":[12,65,88,108,128,166,201,218,274,329,351],"based":[13,141,249],"ramp":[14],"secret":[15,27,47,117,135,171,269,289,325,345],"sharing":[16,28,48,118,136,172,270,290,326,346],"schemes":[17,29,49,137,173,271,291,304,327,347],"extending":[18],"analysis":[20,95],"on":[21,142,250],"linear":[25,45],"threshold":[26,178],"over":[30,66,76,89,109,129,155,167,202,219,275,330,352],"prime":[31,67,77,110,156],"fields":[32,68,78,111,131,157,169,204,221],"that":[33,104,164,198,216],"is":[34,125,162,195,334],"done":[35,96],"by":[36,97],"Benhamouda":[37,98],"et":[38,99],"al.":[39],"in":[40,231],"effort":[42],"to":[43,152,234,344],"construct":[44],"leakage-resilient":[46,116,134,288],"with":[50,69,79,174,292],"constant":[51,70,293],"share":[52,294],"size.":[53],"Since":[54],"there":[55],"does":[56],"not":[57],"exist":[58],"any":[59],"explicit":[60],"efficient":[61],"construction":[62,140,147,154],"AG":[64,127,144,165,200,217,252,273],"field":[71,90],"size,":[72],"constructions":[75,86,248],"help":[81],"concatenation":[83,159,310],"method":[84],"and":[85,122,296],"extensions.":[91],"Extending":[92],"Fourier":[94,318],"al.,":[100],"one":[101],"can":[102],"show":[103,215],"concatenated":[105,143,251],"algebraic":[106,349],"geometric":[107,350],"do":[112],"produce":[113,132],"some":[114,209],"nice":[115],"schemes.":[119],"One":[120],"natural":[121],"curious":[123],"question":[124],"whether":[126],"extension":[130,168,203,220,276,331,353],"better":[133],"than":[138],"codes.":[145],"Such":[146],"provides":[148],"several":[149],"advantage":[150],"compared":[151],"using":[158],"method.":[160],"It":[161],"clear":[163],"give":[170],"a":[175,180],"smaller":[176],"reconstruction":[177],"fixed":[181],"privacy":[182],"parameter":[183],"<inline-formula":[184],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[185],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[186],"<tex-math":[187],"notation=\"LaTeX\">$t$":[188],"</tex-math></inline-formula>":[189],".":[190],"it":[194],"also":[196,214,311],"confirmed":[197],"indeed":[199],"have":[205],"stronger":[206],"under":[208],"reasonable":[210],"assumptions.":[211],"Furthermore,":[212],"may":[222,228],"provide":[223],"strong":[224,313],"multiplicative":[225,314],"property":[226,315],"which":[227],"be":[229,245],"used":[230],"its":[232,336,342],"application":[233,343],"study":[236,267],"multiparty":[238],"computation.":[239],"contrast,":[241],"same":[243],"cannot":[244],"said":[246],"codes,":[253],"even":[254],"when":[255],"are":[257],"considering":[258],"multiplication":[259],"friendly":[260],"embeddings.":[261],"These":[262],"advantages":[263],"strongly":[264],"motivate":[265],"from":[272,328,348],"fields.":[277,332,354],"The":[278],"current":[279],"paper":[280],"has":[281],"two":[282],"main":[283],"contributions:":[284],"(i)":[285],"obtain":[287],"sizes":[295],"unbounded":[297],"numbers":[298],"players.":[300],"Some":[301],"constructed":[305],"without":[306],"use":[308],"possesses":[312],"(ii)":[316],"via":[317],"Analysis,":[319],"analyze":[321],"This":[333],"own":[337],"theoretical":[338],"interest":[339],"independent":[340]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
