Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience

被引:1
|
作者
Shoup, Victor [1 ]
Smart, Nigel P. [2 ,3 ]
机构
[1] Offchain Labs, New York, NY USA
[2] Katholieke Univ Leuven, COSIC, Leuven, Belgium
[3] Zama Inc, Paris, France
关键词
Asynchronous; Verifiable-Secret-Sharing; Galois rings; MULTIPARTY COMPUTATION; MPC; FRAMEWORK; Z(2K);
D O I
10.1007/s00145-024-09505-6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present new protocols for Asynchronous Verifiable Secret Sharing for Shamir (i.e., threshold t < n) sharing of secrets. Our protocols: - Use only "lightweight" cryptographic primitives, such as hash functions; - Can share secrets over rings such as Z/(p(k)) as well as finite fields F-q; - Provide optimal resilience, in the sense that they tolerate up to t < n/3 corruptions, where n is the total number of parties; -Are complete, in the sense that they guarantee that if any honest party receives their share then all honest parties receive their shares; - Employ batching techniques, whereby a dealer shares many secrets in parallel and achieves an amortized communication complexity that is linear inn, at least on the "happy path", where no party provably misbehaves.
引用
收藏
页数:58
相关论文
共 50 条
  • [1] Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience
    Patra, Arpita
    Choudhary, Ashish
    Rangan, C. Pandu
    [J]. INFORMATION THEORETIC SECURITY, 2010, 5973 : 74 - 92
  • [2] A Lightweight Verifiable Secret Sharing in Internet of Things
    Lu, Likang
    Lu, Jianzhu
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (05) : 1028 - 1035
  • [3] Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation
    Patra, Arpita
    Choudhury, Ashish
    Rangan, C. Pandu
    [J]. JOURNAL OF CRYPTOLOGY, 2015, 28 (01) : 49 - 109
  • [4] Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation
    Arpita Patra
    Ashish Choudhury
    C. Pandu Rangan
    [J]. Journal of Cryptology, 2015, 28 : 49 - 109
  • [5] Linear-Communication Asynchronous Complete Secret Sharing with Optimal Resilience
    Ji, Xiaoyu
    Li, Junru
    Song, Yifan
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT VIII, 2024, 14927 : 418 - 453
  • [6] Lightweight, Maliciously Secure Verifiable Function Secret Sharing
    de Castro, Leo
    Polychroniadou, Anitgoni
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT I, 2022, 13275 : 150 - 179
  • [7] Round-optimal and efficient verifiable secret sharing
    Fitzi, Matthias
    Garay, Juan
    Gollakota, Shyamnath
    Rangan, C. Pandu
    Srinathan, Karman
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 329 - 342
  • [8] Publicly verifiable secret sharing
    Stadler, M
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 190 - 199
  • [9] Privacy-Preserving PBFT Based on a New BFT Asynchronous Verifiable Secret Sharing
    Mi, Bo
    Mao, Yongyi
    Huang, Darong
    Wen, Yuan
    Zou, Yongxing
    [J]. 2023 IEEE 12TH DATA DRIVEN CONTROL AND LEARNING SYSTEMS CONFERENCE, DDCLS, 2023, : 167 - 171
  • [10] A Lightweight Public Verifiable Multi Secret Sharing Scheme Using Short Integer Solution
    Dehkordi, Massoud Hadian
    Ghasemi, Reza
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) : 1459 - 1469