{"id":"https://openalex.org/W4408162574","doi":"https://doi.org/10.46586/tches.v2025.i2.420-459","title":"All-You-Can-Compute: Packed Secret Sharing for Combined Resilience","display_name":"All-You-Can-Compute: Packed Secret Sharing for Combined Resilience","publication_year":2025,"publication_date":"2025-03-04","ids":{"openalex":"https://openalex.org/W4408162574","doi":"https://doi.org/10.46586/tches.v2025.i2.420-459"},"language":"en","primary_location":{"id":"doi:10.46586/tches.v2025.i2.420-459","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2025.i2.420-459","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/12053/11897","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tches.iacr.org/index.php/TCHES/article/download/12053/11897","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066436044","display_name":"Sebastian Faust","orcid":"https://orcid.org/0000-0002-8625-4639"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Sebastian Faust","raw_affiliation_strings":["Technical University of Darmstadt, Darmstadt, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Technical University of Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077862698","display_name":"Maximilian Orlt","orcid":null},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Maximilian Orlt","raw_affiliation_strings":["Technical University of Darmstadt, Darmstadt, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Technical University of Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116504059","display_name":"Kathrin Wirschem","orcid":null},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Kathrin Wirschem","raw_affiliation_strings":["Technical University of Darmstadt, Darmstadt, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Technical University of Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075053640","display_name":"Liang Zhao","orcid":"https://orcid.org/0000-0003-0869-7896"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Liang Zhao","raw_affiliation_strings":["Technical University of Darmstadt, Darmstadt, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Technical University of Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5066436044"],"corresponding_institution_ids":["https://openalex.org/I31512782"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01535039,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2025","issue":"2","first_page":"420","last_page":"459"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.7577000260353088,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.7577000260353088,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.7106000185012817,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13048","display_name":"Patient Dignity and Privacy","score":0.7084000110626221,"subfield":{"id":"https://openalex.org/subfields/2739","display_name":"Public Health, Environmental and Occupational Health"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.7377635836601257},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.5614987015724182},{"id":"https://openalex.org/keywords/packed-bed","display_name":"Packed bed","score":0.4670844078063965},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.455083429813385},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3720848858356476},{"id":"https://openalex.org/keywords/materials-science","display_name":"Materials science","score":0.2520890235900879},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.19573533535003662},{"id":"https://openalex.org/keywords/chemical-engineering","display_name":"Chemical engineering","score":0.19095832109451294},{"id":"https://openalex.org/keywords/composite-material","display_name":"Composite material","score":0.10417598485946655},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.09520033001899719}],"concepts":[{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.7377635836601257},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.5614987015724182},{"id":"https://openalex.org/C172331833","wikidata":"https://www.wikidata.org/wiki/Q751029","display_name":"Packed bed","level":2,"score":0.4670844078063965},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.455083429813385},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3720848858356476},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.2520890235900879},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.19573533535003662},{"id":"https://openalex.org/C42360764","wikidata":"https://www.wikidata.org/wiki/Q83588","display_name":"Chemical engineering","level":1,"score":0.19095832109451294},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.10417598485946655},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.09520033001899719}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.46586/tches.v2025.i2.420-459","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2025.i2.420-459","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/12053/11897","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},{"id":"pmh:oai:tubiblio.ulb.tu-darmstadt.de:155247","is_oa":false,"landing_page_url":"http://tubiblio.ulb.tu-darmstadt.de/view/person/Faust=3ASebastian=3A=3A.html>","pdf_url":null,"source":{"id":"https://openalex.org/S4377196390","display_name":"TUbilio (Technical University of Darmstadt)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I31512782","host_organization_name":"Technische Universit\u00e4t Darmstadt","host_organization_lineage":["https://openalex.org/I31512782"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"NonPeerReviewed"},{"id":"pmh:oai:doaj.org/article:f07dc226cd7242089c0703479bc5dfe1","is_oa":true,"landing_page_url":"https://doaj.org/article/f07dc226cd7242089c0703479bc5dfe1","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 2 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tches.v2025.i2.420-459","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2025.i2.420-459","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/12053/11897","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4408162574.pdf"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2524409732"],"abstract_inverted_index":{"Unprotected":[0],"cryptographic":[1],"implementations":[2,31],"are":[3,176,186],"vulnerable":[4],"to":[5,29,50,86,138,162,248,253],"implementation":[6],"attacks,":[7],"such":[8,199],"as":[9,200],"passive":[10],"side-channel":[11],"attacks":[12,34,99],"and":[13,23,38,59,156,172,188,193,211,229],"active":[14],"fault":[15],"injection":[16],"attacks.":[17,180],"Recently,":[18],"countermeasures":[19],"like":[20],"polynomial":[21,63,92,106,147],"masking":[22,25,43,64,93],"duplicated":[24,42],"have":[26],"been":[27],"introduced":[28],"protect":[30],"against":[32,178,226],"combined":[33,98,136,179],"that":[35,122,158,175,185,224],"exploit":[36],"leakage":[37],"faults":[39],"simultaneously.":[40],"While":[41],"requires":[44,65],"O":[45,67],"(t":[46,68],"\u00b7":[47,69],"e)":[48,70],"shares":[49],"resist":[51],"an":[52,140,164,221,249],"adversary":[53],"capable":[54],"of":[55,91,97,113,143,167,196,237,251,256],"probing":[56],"t":[57,227,242],"values":[58],"faulting":[60],"e":[61,230,244],"values,":[62],"only":[66],"shares,":[71],"which":[72],"is":[73,160],"particularly":[74],"beneficial":[75],"for":[76,220],"affine":[77],"computation.":[78],"At":[79],"CHES\u201924,":[80],"Arnold":[81,215],"et":[82,130,207,216],"al.":[83,208,217],"showed":[84],"how":[85],"further":[87],"improve":[88,190,233],"the":[89,95,111,191,201,234,238],"efficiency":[90],"in":[94,145,169],"presence":[96],"by":[100,116,205,214],"embedding":[101],"two":[102,183],"secrets":[103,144,168],"into":[104],"one":[105,146,170],"sharing.":[107],"This":[108],"essentially":[109],"reduces":[110],"complexity":[112,195,236],"previous":[114],"constructions":[115,184],"half.":[117],"The":[118],"authors":[119],"also":[120],"observed":[121],"using":[123],"techniques":[124],"from":[125],"packed":[126],"secret":[127],"sharing":[128],"(Grosso":[129],"al.,":[131],"CHES\u201913)":[132],"cannot":[133],"easily":[134],"achieve":[135],"resilience":[137],"encode":[139],"arbitrary":[141,165],"number":[142,166],"encoding.":[148],"In":[149],"this":[150],"work,":[151],"we":[152,232],"resolve":[153],"these":[154],"challenges":[155],"show":[157],"it":[159],"possible":[161],"embed":[163],"encoding":[171],"propose":[173],"gadgets":[174],"secure":[177],"We":[181],"present":[182],"generic":[187],"significantly":[189],"computational":[192],"randomness":[194,235],"existing":[197],"compilers,":[198],"laOla":[202],"compiler":[203],"presented":[204],"Berndt":[206],"at":[209],"CRYPTO\u201923":[210],"its":[212],"improvement":[213,250],"For":[218],"example,":[219],"AES":[222],"evaluation":[223],"protects":[225],"probes":[228],"faults,":[231],"state-of-the-art":[239],"construction":[240],"when":[241],"+":[243],"&gt;":[245],"3,":[246],"leading":[247],"up":[252],"a":[254],"factor":[255],"2.41.":[257]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
