How to Share a Secret, Infinitely

被引:18
|
作者
Komargodski, Ilan [1 ]
Naor, Moni [1 ]
Yogev, Eylon [1 ]
机构
[1] Weizmann Inst Sci, Rehovot, Israel
来源
关键词
D O I
10.1007/978-3-662-53644-5_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret sharing schemes allow a dealer to distribute a secret piece of information among several parties such that only qualified subsets of parties can reconstruct the secret. The collection of qualified subsets is called an access structure. The best known example is the k-threshold access structure, where the qualified subsets are those of size at least k. When k = 2 and there are n parties, there are schemes where the size of the share each party gets is roughly log n bits, and this is tight even for secrets of 1 bit. In these schemes, the number of parties n must be given in advance to the dealer. In this work we consider the case where the set of parties is not known in advance and could potentially be infinite. Our goal is to give the t th party arriving the smallest possible share as a function of t. Our main result is such a scheme for the k-threshold access structure where the share size of party t is ( k - 1) . log t + poly( k) . o( log t). For k = 2 we observe an equivalence to prefix codes and present matching upper and lower bounds of the form logt + log log t + log log logt + O(1). Finally, we show that for any access structure there exists such a secret sharing scheme with shares of size 2(t-1).
引用
收藏
页码:485 / 514
页数:30
相关论文
共 50 条
  • [1] How to Share a Secret, Infinitely
    Komargodski, Ilan
    Naor, Moni
    Yogev, Eylon
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (06) : 4179 - 4190
  • [2] HOW TO SHARE A SECRET
    SHAMIR, A
    [J]. COMMUNICATIONS OF THE ACM, 1979, 22 (11) : 612 - 613
  • [3] HOW TO SHARE A SECRET
    MIGNOTTE, M
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1983, 149 : 371 - 375
  • [4] How to share a quantum secret
    Cleve, R
    Gottesman, D
    Lo, HK
    [J]. PHYSICAL REVIEW LETTERS, 1999, 83 (03) : 648 - 651
  • [5] HOW TO (REALLY) SHARE A SECRET
    SIMMONS, GJ
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 403 : 390 - 448
  • [6] HOW TO SHARE A SECRET WITH CHEATERS
    TOMPA, M
    WOLL, H
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 : 261 - 265
  • [7] How to share a cake with a secret agent
    Cheze, Guillaume
    [J]. MATHEMATICAL SOCIAL SCIENCES, 2019, 100 : 13 - 15
  • [8] How to Best Share a Big Secret
    Shor, Roman
    Yadgar, Gala
    Huang, Wentao
    Yaakobi, Eitan
    Bruck, Jehoshua
    [J]. SYSTOR'18: PROCEEDINGS OF THE 11TH ACM INTERNATIONAL SYSTEMS AND STORAGE CONFERENCE, 2018, : 76 - 88
  • [9] How to Share Secret Efficiently over Networks
    Harn, Lein
    Hsu, Ching-Fang
    Xia, Zhe
    Zhou, Junwei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [10] Overcoming security limitations of Secret Share techniques: the Nested Secret Share
    Galletta, Antonino
    Taheri, Javid
    Fazio, Maria
    Celesti, Antonio
    Villari, Massimo
    [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 289 - 296