{"id":"https://openalex.org/W3012999850","doi":"https://doi.org/10.1145/3357713.3384293","title":"Better secret sharing via robust conditional disclosure of secrets","display_name":"Better secret sharing via robust conditional disclosure of secrets","publication_year":2020,"publication_date":"2020-06-07","ids":{"openalex":"https://openalex.org/W3012999850","doi":"https://doi.org/10.1145/3357713.3384293","mag":"3012999850"},"language":"en","primary_location":{"id":"doi:10.1145/3357713.3384293","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3357713.3384293","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086684679","display_name":"Benny Applebaum","orcid":"https://orcid.org/0000-0003-4792-369X"},"institutions":[{"id":"https://openalex.org/I16391192","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49","country_code":"IL","type":"education","lineage":["https://openalex.org/I16391192"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Benny Applebaum","raw_affiliation_strings":["Tel Aviv University, Israel"],"affiliations":[{"raw_affiliation_string":"Tel Aviv University, Israel","institution_ids":["https://openalex.org/I16391192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031372016","display_name":"Amos Beimel","orcid":"https://orcid.org/0000-0002-6572-4195"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Amos Beimel","raw_affiliation_strings":["Ben-Gurion University of the Negev, Israel"],"affiliations":[{"raw_affiliation_string":"Ben-Gurion University of the Negev, Israel","institution_ids":["https://openalex.org/I124227911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031619280","display_name":"Oded Nir","orcid":"https://orcid.org/0009-0008-7860-8151"},"institutions":[{"id":"https://openalex.org/I16391192","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49","country_code":"IL","type":"education","lineage":["https://openalex.org/I16391192"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Oded Nir","raw_affiliation_strings":["Tel Aviv University, Israel"],"affiliations":[{"raw_affiliation_string":"Tel Aviv University, Israel","institution_ids":["https://openalex.org/I16391192"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013057020","display_name":"Naty Peter","orcid":null},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Naty Peter","raw_affiliation_strings":["Ben-Gurion University of the Negev, Israel"],"affiliations":[{"raw_affiliation_string":"Ben-Gurion University of the Negev, Israel","institution_ids":["https://openalex.org/I124227911"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5086684679"],"corresponding_institution_ids":["https://openalex.org/I16391192"],"apc_list":null,"apc_paid":null,"fwci":0.14685955,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.51526026,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"2020","issue":null,"first_page":"280","last_page":"293"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9728999733924866,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9610000252723694,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.8433163166046143},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.6225326061248779},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5799996852874756},{"id":"https://openalex.org/keywords/exponent","display_name":"Exponent","score":0.549006462097168},{"id":"https://openalex.org/keywords/monotone-polygon","display_name":"Monotone polygon","score":0.543059229850769},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4871651828289032},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4557788074016571},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.42718926072120667},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4142255485057831},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.413308322429657},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.39482197165489197},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3773697018623352},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3603193461894989},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2928594946861267},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.28113800287246704}],"concepts":[{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.8433163166046143},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.6225326061248779},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5799996852874756},{"id":"https://openalex.org/C2780388253","wikidata":"https://www.wikidata.org/wiki/Q5421508","display_name":"Exponent","level":2,"score":0.549006462097168},{"id":"https://openalex.org/C2834757","wikidata":"https://www.wikidata.org/wiki/Q4925424","display_name":"Monotone polygon","level":2,"score":0.543059229850769},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4871651828289032},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4557788074016571},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.42718926072120667},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4142255485057831},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.413308322429657},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.39482197165489197},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3773697018623352},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3603193461894989},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2928594946861267},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.28113800287246704},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3357713.3384293","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3357713.3384293","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing","raw_type":"proceedings-article"},{"id":"mag:3012999850","is_oa":false,"landing_page_url":"https://eprint.iacr.org/2020/080.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S2764847869","display_name":"IACR Cryptology ePrint Archive","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":["https://openalex.org/P4322614454"],"host_organization_lineage_names":["Cryptology ePrint Archive"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Cryptology ePrint Archive","raw_type":null},{"id":"mag:3013628516","is_oa":false,"landing_page_url":"https://dblp.uni-trier.de/db/journals/eccc/eccc27.html#ApplebaumBNP20","pdf_url":null,"source":{"id":"https://openalex.org/S4306509107","display_name":"Electron. Colloquium Comput. Complex.","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"Electron. Colloquium Comput. Complex.","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5799999833106995,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1510795740","https://openalex.org/W1860948751","https://openalex.org/W2008001880","https://openalex.org/W2076645411","https://openalex.org/W2082145193","https://openalex.org/W2099000090","https://openalex.org/W2121466947","https://openalex.org/W2141420453","https://openalex.org/W2143656893","https://openalex.org/W2165621523","https://openalex.org/W2211075457","https://openalex.org/W2281178725","https://openalex.org/W2295616646","https://openalex.org/W2794870184","https://openalex.org/W2898897019","https://openalex.org/W2951483008","https://openalex.org/W2970097841","https://openalex.org/W3035460207"],"related_works":["https://openalex.org/W3035460207","https://openalex.org/W2973692636","https://openalex.org/W2809318426","https://openalex.org/W2255779533","https://openalex.org/W148149816","https://openalex.org/W1987975907","https://openalex.org/W2297858442","https://openalex.org/W3192906601","https://openalex.org/W2949808512","https://openalex.org/W2099000090","https://openalex.org/W1538418038","https://openalex.org/W2108549024","https://openalex.org/W2093673286","https://openalex.org/W2100265784","https://openalex.org/W1995726850","https://openalex.org/W2363470634","https://openalex.org/W401939403","https://openalex.org/W2962978927","https://openalex.org/W2524272550","https://openalex.org/W2782232030"],"abstract_inverted_index":{"A":[0],"secret-sharing":[1,53,108,118,168],"scheme":[2,54,67],"allows":[3],"to":[4,84,90,110,127,170],"distribute":[5],"a":[6,52,71,140,186,195,204],"secret":[7],"s":[8],"among":[9],"n":[10],"parties":[11,20],"such":[12],"that":[13,41,151,163,199],"only":[14],"some":[15],"predefined":[16],"\u201cauthorized\u201d":[17],"sets":[18,29,47],"of":[19,45,58,106,116,124,129,144,147,159,166],"can":[21,48],"reconstruct":[22],"the":[23,81,104,113,164],"secret,":[24],"and":[25,62,75,176],"all":[26],"other":[27],"\u201cunauthorized\u201d":[28],"learn":[30],"nothing":[31],"about":[32],"s.":[33],"For":[34,112],"over":[35],"30":[36],"years,":[37],"it":[38],"was":[39,68,87],"known":[40],"any":[42],"(monotone)":[43],"collection":[44],"authorized":[46],"be":[49],"realized":[50],"by":[51,92,181,193],"whose":[55],"shares":[56],"are":[57],"size":[59,83],"2":[60],"n\u2212o(n)":[61],"until":[63],"recently":[64],"no":[65],"better":[66],"known.":[69],"In":[70,99],"recent":[72],"breakthrough,":[73],"Liu":[74],"Vaikuntanathan":[76],"(STOC":[77],"2018)":[78],"have":[79],"reduced":[80],"share":[82],"20.994n+o(n),":[85],"which":[86],"later":[88],"improved":[89],"20.892n+o(n)":[91],"Applebaum":[93,130],"et":[94,131],"al.":[95],"(EUROCRYPT":[96],"2019).":[97],"this":[100],"paper":[101],"we":[102,120,138],"improve":[103],"exponent":[105,123],"general":[107,167,196],"down":[109],"0.637.":[111],"special":[114],"case":[115],"linear":[117],"schemes,":[119],"get":[121],"an":[122],"0.762":[125],"(compared":[126],"0.942":[128],"al.).":[132],"As":[133],"our":[134,178],"main":[135,179],"building":[136],"block,":[137],"introduce":[139],"new":[141],"robust":[142,171,183,205],"variant":[143],"conditional":[145],"disclosure":[146],"secrets":[148],"(robust":[149],"CDS)":[150],"achieves":[152],"unconditional":[153],"security":[154],"even":[155],"under":[156],"bounded":[157],"form":[158],"re-usability.":[160],"We":[161],"show":[162],"problem":[165],"reduces":[169],"CDS":[172,184,202],"with":[173,185],"sub-exponential":[174],"overhead":[175],"derive":[177],"result":[180],"implementing":[182],"non-trivial":[187],"exponent.":[188],"The":[189],"latter":[190],"construction":[191],"follows":[192],"presenting":[194],"immunization":[197],"procedure":[198],"turns":[200],"standard":[201],"into":[203],"CDS.":[206]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
