Quadratic Secret Sharing and Conditional Disclosure of Secrets

被引:0
|
作者
Beimel, Amos [1 ]
Othman, Hussien [1 ]
Peter, Naty [2 ]
机构
[1] Ben Gurion Univ Negev, Dept Comp Sci, IL-84105 Beer Sheva, Israel
[2] Georgetown Univ, Dept Comp Sci, Washington, DC 20057 USA
基金
以色列科学基金会; 欧洲研究理事会;
关键词
Protocols; Servers; Cryptography; Upper bound; Boolean functions; Transforms; Task analysis; Secret sharing; share size; polynomial secret sharing; PRIVATE INFORMATION-RETRIEVAL; EXPONENTIAL LOWER BOUNDS; COMPLEXITY; SIZE;
D O I
10.1109/TIT.2023.3296588
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There is a huge gap between the upper and lower bounds on the share size of secret-sharing schemes for n-party access structures; consistent with our current knowledge the optimal share size can be anywhere between polynomial and exponential in n. For linear secret-sharing schemes, the share size for almost all n-party access structures is exponential in n. We would like to study larger classes of secret-sharing schemes with two goals: 1) prove lower bounds for larger classes of secret-sharing schemes; and 2) construct efficient secret-sharing schemes. Given this motivation, Paskin-Cherniavsky and Radune (ITC'20) introduced a new class of secret-sharing schemes in which the shares are generated by applying degree-d polyno-mials to the secret and some random field elements. We define and study two additional classes of polynomial secret-sharing schemes: 1) schemes in which the reconstruction of the secret is done using polynomials; and 2) schemes in which both sharing and reconstruction are done by polynomials. Our main result is a construction of secret-sharing schemes and conditional disclosure of secrets protocols with quadratic sharing and reconstruction that are more efficient than linear secret-sharing schemes. To complement our results, we prove lower bounds on the share size for schemes with polynomial reconstruction. Finally, we give an evidence that schemes with polynomial sharing are probably stronger than schemes with polynomial reconstruction.
引用
收藏
页码:7295 / 7316
页数:22
相关论文
共 50 条
  • [21] Secret image sharing using quadratic residues
    Chen, Chang-Chu
    Chang, Chin-Chen
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 515 - 518
  • [22] Security of audio secret sharing scheme encrypting audio secrets
    Yoshida, Kotaro
    Watanabe, Yodai
    [J]. 2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 294 - 295
  • [23] An on-line secret sharing scheme for multi-secrets
    Hwang, RJ
    Chang, CC
    [J]. COMPUTER COMMUNICATIONS, 1998, 21 (13) : 1170 - 1176
  • [24] Threshold audio secret sharing schemes encrypting audio secrets
    Ishizuka, Tetsuro
    Watanabe, Yodai
    [J]. 2020 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2020,
  • [25] Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption
    Gay, Romain
    Kerenidis, Iordanis
    Wee, Hoeteck
    [J]. ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 485 - 502
  • [26] A Dynamic Proactive Secret Sharing Scheme for Quadratic Functions
    Chen, Hong
    Zhang, Liangfeng
    [J]. IEEE ACCESS, 2024, 12 : 25749 - 25761
  • [27] A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets
    Liu, Yanjun
    Harn, Lein
    Chang, Chin-Chen
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (07) : 1282 - 1292
  • [28] A novel multi secret image sharing scheme for different dimension secrets
    Arjun Singh Rawat
    Maroti Deshmukh
    Maheep Singh
    [J]. Multimedia Tools and Applications, 2023, 82 : 35183 - 35219
  • [29] Gruppen secret sharing or how to share several secrets if you must?
    Csirmaz, Laszlo
    [J]. MATHEMATICA SLOVACA, 2013, 63 (06) : 1391 - 1402
  • [30] Computationally Secure Verifiable Secret Sharing Scheme for Distributing Many Secrets
    Ogata, Wakaha
    Araki, Toshinori
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (01) : 103 - 114