{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T09:54:24Z","timestamp":1740131664260,"version":"3.37.3"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001381","name":"National Research Foundation, Singapore, under its Strategic Capability Research Centres Funding Initiative","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Project","award":["2021YFE0109900","2020YFA0712300"],"award-info":[{"award-number":["2021YFE0109900","2020YFA0712300"]}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["12031011"],"award-info":[{"award-number":["12031011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/tit.2022.3198407","type":"journal-article","created":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T19:58:50Z","timestamp":1660593530000},"page":"8228-8250","source":"Crossref","is-referenced-by-count":1,"title":["Leakage-Resilient Secret Sharing With Constant Share Size"],"prefix":"10.1109","volume":"68","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4731-1426","authenticated-orcid":false,"given":"Ivan","family":"Tjuawinata","sequence":"first","affiliation":[{"name":"Strategic Centre for Research on Privacy-Preserving Technologies and Systems, Nanyang Technological University, Jurong West, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1257-1033","authenticated-orcid":false,"given":"Chaoping","family":"Xing","sequence":"additional","affiliation":[{"name":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107325951"},{"article-title":"RSA threshold cryptography","year":"2005","author":"nguyen","key":"ref38"},{"key":"ref33","first-page":"388","article-title":"Differential power analysis","volume":"1666","author":"kocher","year":"1999","journal-title":"Advances in Cryptology"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3335741.3335768"},{"key":"ref30","first-page":"463","article-title":"Private circuits: Securing hardware against probing attacks","volume":"23","author":"ishai","year":"2003","journal-title":"Advances in Cryptology"},{"key":"ref37","first-page":"33","article-title":"Some applications of coding theory in cryptography","volume":"4","author":"massey","year":"1995","journal-title":"Codes Ciphers Cryptogr Coding"},{"journal-title":"On Leakage-Resilient Secret Sharing","year":"2020","author":"maji","key":"ref36"},{"key":"ref35","first-page":"200","article-title":"Leakage-resilient secret sharing","volume":"25","author":"kumar","year":"2018","journal-title":"Electron Colloq Comput Complex"},{"key":"ref34","article-title":"Secret sharing made short","volume":"773","author":"krawczyk","year":"1994","journal-title":"Advances in Cryptology"},{"key":"ref28","article-title":"Proactive secret sharing or: How to cope with perpetual leakage","volume":"963","author":"herzberg","year":"1995","journal-title":"Advances in Cryptology"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2702660"},{"key":"ref29","first-page":"63","article-title":"Secret sharing schemes with applications in security protocols","volume":"16","author":"iftene","year":"2006","journal-title":"Sci Ann Cuza Univ"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978331"},{"key":"ref1","article-title":"Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures","volume":"11693","author":"aggarwal","year":"2019","journal-title":"Advances in Cryptology"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1987.4"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1006\/jnth.1996.0147"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3188745.3188872"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"ref26","article-title":"Montreal lecture notes on quadratic Fourier analysis","author":"green","year":"2006","journal-title":"arXiv math\/0604089"},{"key":"ref25","article-title":"Non-malleable secret sharing for general access structures","volume":"10991","author":"goyal","year":"2018","journal-title":"Advances in Cryptology"},{"key":"ref50","article-title":"Publicly verifiable secret sharing","volume":"1070","author":"stadler","year":"1996","journal-title":"Advances in Cryptology"},{"journal-title":"Algebraic Function Fields and Codes","year":"2008","author":"stichtenoth","key":"ref51"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1085126.1085127"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46513-8_15"},{"key":"ref10","article-title":"Algebraic geometric secret sharing schemes and secure multi-party computations over small fields","volume":"4117","author":"chen","year":"2006","journal-title":"Advances in Cryptology"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57339-7_3"},{"key":"ref40","article-title":"Lower bounds for leakage-resilient secret sharing","volume":"12105","author":"nielsen","year":"2020","journal-title":"Advances in Cryptology"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/0885-064X(88)90012-X"},{"key":"ref13","article-title":"SPDZ2 k: Efficient MPC mod 2k for dishonest majority","volume":"10992","author":"cramer","year":"2018","journal-title":"Advances in Cryptology"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"ref15","first-page":"120","article-title":"Society and group oriented cryptography: A new concept","author":"desmedt","year":"1987","journal-title":"Proc Conf Theory Appl Cryptograph Techn Adv Cryptol (CRYPTO)"},{"key":"ref16","first-page":"307","article-title":"Threshold cryptosystems","volume":"435","author":"desmedt","year":"1990","journal-title":"Advances in Cryptology"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536498"},{"key":"ref18","first-page":"207","article-title":"Intrusion-resilience via the bounded-storage model","volume":"3876","author":"dziembowski","year":"2006","journal-title":"Proc Conf Theory of Cryptography"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.63"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27800-9_7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-021-09375-2"},{"key":"ref8","article-title":"Asymptotically good ideal linear secret sharing with strong multiplication over any fixed finite field","volume":"5677","author":"cascudo","year":"2009","journal-title":"Advances in Cryptology"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-013-0206-z"},{"key":"ref49","article-title":"Leakage resilient secret sharing and applications","volume":"11693","author":"srinivasan","year":"2019","journal-title":"Advances in Cryptology"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62214"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_15"},{"key":"ref45","first-page":"397","article-title":"Sur le nombre des points rationnels d&#x2019;une courbe alg&#x00E9;brique sur un corps fini","volume":"296","author":"serre","year":"1983","journal-title":"Comp Rendus l&#x2019;Acad&#x00E9;mie Sci"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0087999"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0020-9"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73014"},{"key":"ref41","article-title":"Non-interactive and information-theoretic secure verifiable secret sharing","volume":"576","author":"pedersen","year":"1992","journal-title":"Advances in Cryptology"},{"key":"ref44","article-title":"A simple publicly verifiable secret sharing scheme and its application to electronic voting","volume":"1666","author":"schoenmakers","year":"1999","journal-title":"Advances in Cryptology"},{"key":"ref43","first-page":"1","article-title":"AONT-RS: Blending security and performance in dispersed storage systems","volume":"14","author":"resch","year":"2011","journal-title":"Proc 9th USENIX Conf File Stroage Technol (FAST)"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/9961124\/09856680.pdf?arnumber=9856680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:11:56Z","timestamp":1670872316000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9856680\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":53,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tit.2022.3198407","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"type":"print","value":"0018-9448"},{"type":"electronic","value":"1557-9654"}],"subject":[],"published":{"date-parts":[[2022,12]]}}}