Proactive Secret Sharing with Constant Communication

被引:0
|
作者
Falk, Brett Hemenway [1 ]
Noble, Daniel [1 ]
Rabin, Tal [1 ]
机构
[1] Univ Penn, Philadelphia, PA 19104 USA
来源
关键词
RAMANUJAN GRAPHS;
D O I
10.1007/978-3-031-48618-0_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the first protocols for Proactive Secret Sharing (PSS) that only require constant (in the number of parties, n) communication per party per epoch. By harnessing the power of expander graphs, we are able to obtain strong guarantees about the security of the system. We present the following PSS protocols: - A PSS protocol that provides privacy (but no robustness) against an adversary controlling O(n) parties per epoch. - A PSS protocol that provides robustness (but no privacy) against an adversary controlling O(n) parties per epoch. - A PSS protocol that provides privacy against an adversary controlling O(n(a)) parties per epoch and provides robustness against an adversary controlling O(n(1-a)) parties per epoch, for any constant 0 <= a <= 1. Instantiating this with a = 1/2 gives a PSS protocol that is proactively secure (private and robust) against an adversary controlling O(root n) parties per epoch. Additionally, we discuss how secure channels, whose existence is usually assumed by PSS protocols, are challenging to create in the mobile adversary setting, and we present a method to instantiate them from a weaker assumption.
引用
收藏
页码:337 / 373
页数:37
相关论文
共 50 条
  • [31] COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services
    Vassantlal, Robin
    Alchieri, Eduardo
    Ferreira, Bernardo
    Bessani, Alysson
    43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 1335 - 1353
  • [32] Provably Secure Proactive Secret Sharing Without the Adjacent Assumption
    Xia, Zhe
    Yang, Bo
    Zhou, Yanwei
    Zhang, Mingwu
    Shen, Hua
    Mu, Yi
    PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 : 247 - 264
  • [33] A proactive quantum secret sharing scheme based on GHZ state
    Qin, Huawang
    Zhu, Xiaohua
    Dai, Yuewei
    MODERN PHYSICS LETTERS B, 2015, 29 (27):
  • [34] A proactive secret sharing scheme based on Chinese remainder theorem
    Keju Meng
    Fuyou Miao
    Yu Ning
    Wenchao Huang
    Yan Xiong
    Chin-Chen Chang
    Frontiers of Computer Science, 2021, 15
  • [35] A Proactive Secret Sharing Scheme Based on Elliptic Curve Cryptography
    Sun, Hua
    Zheng, Xuefeng
    Yu, Yike
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 666 - 669
  • [36] A novel proactive secret image sharing scheme based on LISS
    Cheng Guo
    Huan Zhang
    Zhangjie Fu
    Bin Feng
    Mingchu Li
    Multimedia Tools and Applications, 2018, 77 : 19569 - 19590
  • [37] A novel proactive secret image sharing scheme based on LISS
    Guo, Cheng
    Zhang, Huan
    Fu, Zhangjie
    Feng, Bin
    Li, Mingchu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (15) : 19569 - 19590
  • [38] A proactive secret sharing scheme based on Chinese remainder theorem
    Meng, Keju
    Miao, Fuyou
    Ning, Yu
    Huang, Wenchao
    Xiong, Yan
    Chang, Chin-Chen
    FRONTIERS OF COMPUTER SCIENCE, 2021, 15 (02)
  • [39] VPSS: A verifiable proactive secret sharing scheme in distributed systems
    Pramanik, S
    Upadhyaya, S
    MILCOM 2003 - 2003 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2003, : 826 - 831
  • [40] On the Power of Amortization in Secret Sharing: d-Uniform Secret Sharing and CDS with Constant Information Rate
    Applebaum, Benny
    Arkis, Barak
    ACM TRANSACTIONS ON COMPUTATION THEORY, 2020, 12 (04)