Proactive Secret Sharing with Constant Communication

被引:0
|
作者
Falk, Brett Hemenway [1 ]
Noble, Daniel [1 ]
Rabin, Tal [1 ]
机构
[1] Univ Penn, Philadelphia, PA 19104 USA
来源
关键词
RAMANUJAN GRAPHS;
D O I
10.1007/978-3-031-48618-0_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the first protocols for Proactive Secret Sharing (PSS) that only require constant (in the number of parties, n) communication per party per epoch. By harnessing the power of expander graphs, we are able to obtain strong guarantees about the security of the system. We present the following PSS protocols: - A PSS protocol that provides privacy (but no robustness) against an adversary controlling O(n) parties per epoch. - A PSS protocol that provides robustness (but no privacy) against an adversary controlling O(n) parties per epoch. - A PSS protocol that provides privacy against an adversary controlling O(n(a)) parties per epoch and provides robustness against an adversary controlling O(n(1-a)) parties per epoch, for any constant 0 <= a <= 1. Instantiating this with a = 1/2 gives a PSS protocol that is proactively secure (private and robust) against an adversary controlling O(root n) parties per epoch. Additionally, we discuss how secure channels, whose existence is usually assumed by PSS protocols, are challenging to create in the mobile adversary setting, and we present a method to instantiate them from a weaker assumption.
引用
收藏
页码:337 / 373
页数:37
相关论文
共 50 条
  • [21] Proactive secret sharing or: How to cope with perpetual leakage
    Herzberg, A
    Jarecki, S
    Krawczyk, H
    Yung, MT
    ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 339 - 352
  • [22] A Dynamic Proactive Secret Sharing Scheme for Quadratic Functions
    Chen, Hong
    Zhang, Liangfeng
    IEEE ACCESS, 2024, 12 : 25749 - 25761
  • [23] CHURP: Dynamic-Committee Proactive Secret Sharing
    Maram, Sai Krishna Deepak
    Zhang, Fan
    Wang, Lun
    Low, Andrew
    Zhang, Yupeng
    Juels, Ari
    Song, Dawn
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 2369 - 2386
  • [24] Proactive Verifiable Linear Integer Secret Sharing Scheme
    Ma, Chuangui
    Ding, Xiaofei
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 439 - 448
  • [25] A proactive secret sharing for server assisted threshold signatures
    Yang, Jong-Phil
    Rhee, Kyung Hyune
    Sakurai, Kouichi
    HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, 4208 : 250 - 259
  • [26] An Efficient Proactive Secret Sharing Scheme for Cloud Storage
    Zhang, Shuihai
    Wang, Jingfu
    Zhang, Yan
    Pei, Bei
    Lyu, Chunli
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2021, 2021, 12809 : 346 - 357
  • [28] Communication efficient quantum secret sharing
    Senthoor, Kaushik
    Sarvepalli, Pradeep Kiran
    PHYSICAL REVIEW A, 2019, 100 (05)
  • [29] Unconditionally secure proactive secret sharing scheme with combinatorial structures
    Stinson, DR
    Wei, R
    SELECTED AREAS IN CRYPTOGRAPHY, PROCEEDINGS, 2000, 1758 : 200 - 214
  • [30] A proactive secret sharing scheme based on Chinese remainder theorem
    Keju MENG
    Fuyou MIAO
    Yu NING
    Wenchao HUANG
    Yan XIONG
    ChinChen CHANG
    Frontiers of Computer Science, 2021, (02) : 127 - 136