Proactive Secret Sharing with Constant Communication

被引:0
|
作者
Falk, Brett Hemenway [1 ]
Noble, Daniel [1 ]
Rabin, Tal [1 ]
机构
[1] Univ Penn, Philadelphia, PA 19104 USA
来源
关键词
RAMANUJAN GRAPHS;
D O I
10.1007/978-3-031-48618-0_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the first protocols for Proactive Secret Sharing (PSS) that only require constant (in the number of parties, n) communication per party per epoch. By harnessing the power of expander graphs, we are able to obtain strong guarantees about the security of the system. We present the following PSS protocols: - A PSS protocol that provides privacy (but no robustness) against an adversary controlling O(n) parties per epoch. - A PSS protocol that provides robustness (but no privacy) against an adversary controlling O(n) parties per epoch. - A PSS protocol that provides privacy against an adversary controlling O(n(a)) parties per epoch and provides robustness against an adversary controlling O(n(1-a)) parties per epoch, for any constant 0 <= a <= 1. Instantiating this with a = 1/2 gives a PSS protocol that is proactively secure (private and robust) against an adversary controlling O(root n) parties per epoch. Additionally, we discuss how secure channels, whose existence is usually assumed by PSS protocols, are challenging to create in the mobile adversary setting, and we present a method to instantiate them from a weaker assumption.
引用
收藏
页码:337 / 373
页数:37
相关论文
共 50 条
  • [41] On the Power of Amortization in Secret Sharing: d-Uniform Secret Sharing and CDS with Constant Information Rate
    Applebaum, Benny
    Arkis, Barak
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT I, 2018, 11239 : 317 - 344
  • [42] The Prospects of Quantum Secure Communication for Secret Sharing
    Chou, Yao-Hsin
    Tseng, Kuo-Chun
    Kuo, Shu-Yu
    Kuo, Sy-Yen
    Sheu, Bing
    IEEE NANOTECHNOLOGY MAGAZINE, 2023, 17 (02) : 38 - 44
  • [43] Theory of Communication Efficient Quantum Secret Sharing
    Senthoor, Kaushik
    Sarvepalli, Pradeep Kiran
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (05) : 3164 - 3186
  • [44] Wireless Multihop Transmissions for Secret Sharing Communication
    Kanachi, Tetsuya
    Higaki, Hiroaki
    2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 808 - 813
  • [45] Structuring proactive secret sharing in mobile ad-hoc networks
    Asaeda, Hitoshi
    Rahman, Musfiq
    Toyama, Yoshihiro
    INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING 2006, CONFERENCE PROGRAM, 2006, : 342 - +
  • [46] An Efficient Proactive Share Refreshing Scheme for Secret Sharing in Distributed Systems
    Tang, Caimu
    Wu, Dapeng Oliver
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [47] An Elliptic Curve Digital Signature Scheme Based on Proactive Secret Sharing
    Guo, Ping
    Zhang, Hong
    PROCEEDINGS OF THE 2009 WRI GLOBAL CONGRESS ON INTELLIGENT SYSTEMS, VOL II, 2009, : 523 - 525
  • [48] A Proactive Multi Stage Secret Sharing Scheme for Any Given Access Structure
    Massoud Hadian Dehkordi
    Samaneh Mashhadi
    Hossein Oraei
    Wireless Personal Communications, 2019, 104 : 491 - 503
  • [49] Leakage-Resilient Secret Sharing With Constant Share Size
    Tjuawinata, Ivan
    Xing, Chaoping
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (12) : 8228 - 8250
  • [50] On the Design of a Searchable Encryption Protocol for Keyword Search using Proactive Secret Sharing
    Praveen, K.
    Anand, Gabriel K. S.
    Ray, Indranil Ghosh
    Adhikari, Avishek
    Datta, Sabyasachi
    Biswas, Arnab Kumar
    2024 IEEE 20TH INTERNATIONAL CONFERENCE ON E-SCIENCE, E-SCIENCE 2024, 2024,