Proactive Secret Sharing with Constant Communication

被引:0
|
作者
Falk, Brett Hemenway [1 ]
Noble, Daniel [1 ]
Rabin, Tal [1 ]
机构
[1] Univ Penn, Philadelphia, PA 19104 USA
来源
关键词
RAMANUJAN GRAPHS;
D O I
10.1007/978-3-031-48618-0_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the first protocols for Proactive Secret Sharing (PSS) that only require constant (in the number of parties, n) communication per party per epoch. By harnessing the power of expander graphs, we are able to obtain strong guarantees about the security of the system. We present the following PSS protocols: - A PSS protocol that provides privacy (but no robustness) against an adversary controlling O(n) parties per epoch. - A PSS protocol that provides robustness (but no privacy) against an adversary controlling O(n) parties per epoch. - A PSS protocol that provides privacy against an adversary controlling O(n(a)) parties per epoch and provides robustness against an adversary controlling O(n(1-a)) parties per epoch, for any constant 0 <= a <= 1. Instantiating this with a = 1/2 gives a PSS protocol that is proactively secure (private and robust) against an adversary controlling O(root n) parties per epoch. Additionally, we discuss how secure channels, whose existence is usually assumed by PSS protocols, are challenging to create in the mobile adversary setting, and we present a method to instantiate them from a weaker assumption.
引用
收藏
页码:337 / 373
页数:37
相关论文
共 50 条
  • [1] Improvement of Communication Traffic and Security of Proactive Secret Sharing Schemes and Combination Proactive Secret Sharing Scheme with an Asymmetric Secret Sharing Scheme
    Kaneko, Naoto
    Iwamura, Keiichi
    2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 13 - 18
  • [2] On Proactive Secret Sharing Schemes
    Nikov, V
    Nikova, S
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 308 - 325
  • [3] Proactive secret sharing algorithm
    Teng, Meng
    Zou, Peng
    Wang, Huai-Min
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2003, 40 (07):
  • [4] Efficient Proactive Secret Sharing
    Brendel, Jacqueline
    Demirel, Denise
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [5] Proactive quantum secret sharing
    Qin, Huawang
    Dai, Yuewei
    QUANTUM INFORMATION PROCESSING, 2015, 14 (11) : 4237 - 4244
  • [6] Proactive quantum secret sharing
    Huawang Qin
    Yuewei Dai
    Quantum Information Processing, 2015, 14 : 4237 - 4244
  • [7] Proactive Secret Sharing Scheme Suitable for Asymmetric Secret Sharing Scheme
    Kaneko, Naoto
    Iwamura, Keiichi
    2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
  • [8] Verifiable Secret Redistribution for Proactive Secret Sharing Schemes
    于佳
    孔凡玉
    李大兴
    JournalofShanghaiJiaotongUniversity(Science), 2006, (02) : 236 - 241
  • [9] Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities
    Eldefrawy, Karim
    Lepoint, Tancrede
    Leroux, Antonin
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 3 - 23
  • [10] MPSS: Mobile Proactive Secret Sharing
    Schultz, David
    Liskov, Barbara
    Liskov, Moses
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (04)