Private Access Control for Function Secret Sharing

被引:2
|
作者
Servan-Schreiber, Sacha [1 ]
Beyzerov, Simon [2 ]
Yablon, Eli [2 ]
Park, Hyojae [2 ]
机构
[1] MIT, CSAIL, Cambridge, MA 02139 USA
[2] MIT, PRIMES, Cambridge, MA 02139 USA
关键词
D O I
10.1109/SP46215.2023.10179295
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Function Secret Sharing (FSS; Eurocrypt 2015) allows a dealer to share a function f with two or more evaluators. Given secret shares of a function f, the evaluators can locally compute secret shares of f(x) for any input x, without learning information about f in the process. In this paper, we initiate the study of access control for FSS. Given the shares of f, the evaluators can ensure that the dealer is authorized to share the provided function. For a function family F and an access control list defined over the family, the evaluators receiving the shares of f is an element of F can efficiently check that the dealer knows the access key for f. This model enables new applications of FSS, such as: (1) anonymous authentication in a multi-party setting, (2) access control in private databases, and (3) authentication and spam prevention in anonymous communication systems. Our definitions and constructions abstract and improve the concrete efficiency of several recent systems that implement ad-hoc mechanisms for access control over FSS. The main building block behind our efficiency improvement is a discrete-logarithm zero-knowledge proof-of-knowledge over secret-shared elements, which may be of independent interest. We evaluate our constructions and show a 50-70x reduction in computational overhead compared to existing access control techniques used in anonymous communication. In other applications, such as private databases, the processing cost of introducing access control is only 1.5-3x, when amortized over databases with 500,000 or more items.
引用
收藏
页码:809 / 828
页数:20
相关论文
共 50 条
  • [41] Linear secret sharing schemes and rearrangements of access structures
    Xiao L.-L.
    Liu M.-L.
    Acta Mathematicae Applicatae Sinica, 2004, 20 (4) : 685 - 694
  • [42] Verifiable quantum secret sharing with multi access structures
    Mashhadi, Samaneh
    OPTIK, 2022, 270
  • [43] Quantum secret sharing for a general quantum access structure
    Chen-Ming Bai
    Zhi-Hui Li
    Meng-Meng Si
    Yong-Ming Li
    The European Physical Journal D, 2017, 71
  • [44] A construction for secret sharing scheme with general access structure
    Guo, C. (guo8016@gmail.com), 1600, Ubiquitous International (04):
  • [45] Verifiable quantum secret sharing with multi access structures
    Mashhadi, Samaneh
    Optik, 2022, 270
  • [46] Multi-Secret Sharing Threshold Access Structure
    Reddy, L. Siva
    Prasad, Munaga V. N. K.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1585 - 1590
  • [47] Generalized general access structure in secret image sharing
    Yan, Xuehu
    Lu, Yuliang
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2019, 58 : 89 - 101
  • [48] Multiple secret image sharing with general access structure
    Chen, Tzung-Her
    Wu, Xi-Wen
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (19-20) : 13247 - 13265
  • [49] Rearrangements of access structures and their realizations in secret sharing schemes
    Zhang, Zhifang
    Liu, Mulan
    Xiao, Liangliang
    DISCRETE MATHEMATICS, 2008, 308 (21) : 4882 - 4891
  • [50] A perfect secret sharing scheme for general access structures
    Jia, Xingxing
    Guo, Yusheng
    Luo, Xiangyang
    Wang, Daoshun
    Zhang, Chaoyang
    INFORMATION SCIENCES, 2022, 595 : 54 - 69