Private Access Control for Function Secret Sharing

被引:2
|
作者
Servan-Schreiber, Sacha [1 ]
Beyzerov, Simon [2 ]
Yablon, Eli [2 ]
Park, Hyojae [2 ]
机构
[1] MIT, CSAIL, Cambridge, MA 02139 USA
[2] MIT, PRIMES, Cambridge, MA 02139 USA
关键词
D O I
10.1109/SP46215.2023.10179295
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Function Secret Sharing (FSS; Eurocrypt 2015) allows a dealer to share a function f with two or more evaluators. Given secret shares of a function f, the evaluators can locally compute secret shares of f(x) for any input x, without learning information about f in the process. In this paper, we initiate the study of access control for FSS. Given the shares of f, the evaluators can ensure that the dealer is authorized to share the provided function. For a function family F and an access control list defined over the family, the evaluators receiving the shares of f is an element of F can efficiently check that the dealer knows the access key for f. This model enables new applications of FSS, such as: (1) anonymous authentication in a multi-party setting, (2) access control in private databases, and (3) authentication and spam prevention in anonymous communication systems. Our definitions and constructions abstract and improve the concrete efficiency of several recent systems that implement ad-hoc mechanisms for access control over FSS. The main building block behind our efficiency improvement is a discrete-logarithm zero-knowledge proof-of-knowledge over secret-shared elements, which may be of independent interest. We evaluate our constructions and show a 50-70x reduction in computational overhead compared to existing access control techniques used in anonymous communication. In other applications, such as private databases, the processing cost of introducing access control is only 1.5-3x, when amortized over databases with 500,000 or more items.
引用
收藏
页码:809 / 828
页数:20
相关论文
共 50 条
  • [21] Secret sharing on regular bipartite access structures
    Gyarmati, Mate
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (05) : 1951 - 1971
  • [22] Secret sharing schemes for compartmented access structures
    Wang, Xianfang
    Xiang, Can
    Fu, Fang-Wei
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2017, 9 (05): : 625 - 635
  • [23] Secret sharing schemes for compartmented access structures
    Xianfang Wang
    Can Xiang
    Fang-Wei Fu
    Cryptography and Communications, 2017, 9 : 625 - 635
  • [24] Verifiable secret sharing with changeable access structure
    Ghebleh, Mohammad
    Kanso, Ali
    Abuhasan, Haya
    DISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS, 2024,
  • [25] A quantum secret sharing scheme on access structure
    Qin, Huawang
    Zhu, Xiaohua
    Dai, Yuewei
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2016, 39 (02) : 186 - 191
  • [26] Secret sharing schemes with bipartite access structure
    Padró, C
    Sáez, G
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (07) : 2596 - 2604
  • [27] Secret sharing on regular bipartite access structures
    Máté Gyarmati
    Designs, Codes and Cryptography, 2023, 91 : 1951 - 1971
  • [28] Secret Sharing Schemes with General Access Structures
    Liu, Jian
    Mesnager, Sihem
    Chen, Lusheng
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 341 - 360
  • [29] Access structures of hyperelliptic secret sharing schemes
    Yang, Siman
    Wu, Hongfeng
    Lie, Jiyou
    FINITE FIELDS AND THEIR APPLICATIONS, 2016, 37 : 46 - 53
  • [30] Analog Secret Sharing With Applications to Private Distributed Learning
    Soleymani, Mahdi
    Mahdavifar, Hessam
    Avestimehr, A. Salman
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1893 - 1904