Quadratic Secret Sharing and Conditional Disclosure of Secrets

被引:0
|
作者
Beimel, Amos [1 ]
Othman, Hussien [1 ]
Peter, Naty [2 ]
机构
[1] Ben Gurion Univ Negev, Dept Comp Sci, IL-84105 Beer Sheva, Israel
[2] Georgetown Univ, Dept Comp Sci, Washington, DC 20057 USA
基金
以色列科学基金会; 欧洲研究理事会;
关键词
Protocols; Servers; Cryptography; Upper bound; Boolean functions; Transforms; Task analysis; Secret sharing; share size; polynomial secret sharing; PRIVATE INFORMATION-RETRIEVAL; EXPONENTIAL LOWER BOUNDS; COMPLEXITY; SIZE;
D O I
10.1109/TIT.2023.3296588
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There is a huge gap between the upper and lower bounds on the share size of secret-sharing schemes for n-party access structures; consistent with our current knowledge the optimal share size can be anywhere between polynomial and exponential in n. For linear secret-sharing schemes, the share size for almost all n-party access structures is exponential in n. We would like to study larger classes of secret-sharing schemes with two goals: 1) prove lower bounds for larger classes of secret-sharing schemes; and 2) construct efficient secret-sharing schemes. Given this motivation, Paskin-Cherniavsky and Radune (ITC'20) introduced a new class of secret-sharing schemes in which the shares are generated by applying degree-d polyno-mials to the secret and some random field elements. We define and study two additional classes of polynomial secret-sharing schemes: 1) schemes in which the reconstruction of the secret is done using polynomials; and 2) schemes in which both sharing and reconstruction are done by polynomials. Our main result is a construction of secret-sharing schemes and conditional disclosure of secrets protocols with quadratic sharing and reconstruction that are more efficient than linear secret-sharing schemes. To complement our results, we prove lower bounds on the share size for schemes with polynomial reconstruction. Finally, we give an evidence that schemes with polynomial sharing are probably stronger than schemes with polynomial reconstruction.
引用
收藏
页码:7295 / 7316
页数:22
相关论文
共 50 条
  • [41] Generalized Graph-based Visual Secret Sharing Schemes for Multiple Secrets
    Suga, Yuji
    [J]. 2016 10TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2016, : 614 - 619
  • [42] On Distributed Multi-User Secret Sharing with Multiple Secrets per User
    Chigullapally, Rasagna
    Athi, Harshithanjani
    Lalitha, V.
    Karamchandani, Nikhil
    [J]. 2024 NATIONAL CONFERENCE ON COMMUNICATIONS, NCC, 2024,
  • [43] A novel visual secret sharing scheme for multiple secrets without pixel expansion
    Lin, Tsung-Lieh
    Horng, Shi-Jinn
    Lee, Kai-Hui
    Chiu, Pei-Ling
    Kao, Tzong-Wann
    Chen, Yuan-Hsin
    Run, Ray-Shine
    Lai, Jui-Lin
    Chen, Rong-Jian
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (12) : 7858 - 7869
  • [44] Keeping secrets secret
    Reed, S
    [J]. AMERICAN JOURNAL OF NURSING, 2000, 100 (08) : 73 - 74
  • [45] THE SECRET OF KEEPING SECRETS
    LYTLE, D
    [J]. PHOTONICS SPECTRA, 1986, 20 (12) : 32 - 33
  • [46] KEEPING SECRETS SECRET
    TORTOLAN.FW
    [J]. METALWORKING ECONOMICS, 1971, 27 (06): : 19 - &
  • [47] SECRET IS TO HAVE NO SECRETS
    RICH, V
    [J]. NATURE, 1978, 274 (5669) : 305 - 305
  • [48] Sharing secrets
    [J]. Nature Biotechnology, 2011, 29 : 291 - 291
  • [49] SECRETS ARE FOR SHARING
    BENNETT, CC
    [J]. PSYCHOLOGY TODAY, 1969, 2 (09) : 31 - &
  • [50] Sharing a secret: Disclosure practices among adolescents and young adults with chronic illness
    Venema, Kaitlin
    Conn, Bridgid Mariko
    Tanaka, Diane
    Silge, Karl
    Iverson, Ellen
    [J]. CURRENT PSYCHOLOGY, 2024, 43 (06) : 5742 - 5752