Adaptively and Unconditionally Secure Conversion Protocols between Ramp and Linear Secret Sharing

被引:1
|
作者
Kikuchi, Ryo [1 ]
Ikarashi, Dai [1 ]
Hamada, Koki [1 ]
Chida, Koji [1 ]
机构
[1] NTT Corp, Musashino, Tokyo 1808585, Japan
关键词
secret sharing scheme; multiparty computation; unconditional security; active security; honest majority; COMPUTATION;
D O I
10.1587/transfun.E98.A.223
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Secret sharing (SS) has been extensively studied as for both secure data storage and a fundamental building block for multiparty computation (MPC). Recently, Kikuchi et al. proposed a passively and unconditionally secure conversion protocol that converts from a share of a ramp scheme to another of homomorphic SS scheme. The share-size of the ramp scheme is small, and the homomorphic SS scheme is a class of SS schemes that includes Shamir's and replicated SS schemes, which are convenient for MPC. Therefore, their protocol is a conversion from an SS scheme whose share-size is small to MPC-friendly SS schemes, and can be applied to reduce the amount of data storage while maintaining extendibility to MPC. We propose five unconditionally and actively secure protocols in the honest majority. In this paper, we consider a privacy and correctness as security requirement and does not consider a robustness: A cheat caused by an active adversary must be detected. These protocols consist of two conversion protocols, two reveal protocols and a protocol generating specific randomness. Main protocols among them are two conversion protocols for bilateral conversion between a ramp scheme and linear SS scheme, and the others are building blocks of the main protocols. Linear SS scheme is a subset of homomorphic SS scheme but includes both Shamir's and replicated SS schemes. Therefore, these main protocols are conversions between an SS scheme whose share-size is small to MPC-friendly SS schemes. These main protocols are unconditionally and actively secure so if MPC protocols used after the conversion are actively secure, the whole system involving SS scheme, conversion, and MPC protocols can be unconditionally and actively secure by using our main protocols. One of our two main protocols is the first to convert from MPC-friendly SS schemes to the ramp scheme. This enhances applications, such as secure backup, of the conversion protocol. Other than the two main protocols, we propose a protocol for generating specific randomnesses and two reveal protocols as building blocks. The latter two reveal protocols are actively and unconditionally secure in the honest majority and requires O(n parallel to F parallel to)-bit communication per revealing, and we believe that it is independently interest.
引用
收藏
页码:223 / 231
页数:9
相关论文
共 36 条
  • [1] Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes
    Eriguchi, Reo
    Kunihiro, Noboru
    [J]. 2019 IEEE INFORMATION THEORY WORKSHOP (ITW), 2019, : 264 - 268
  • [2] Unconditionally secure social secret sharing scheme
    Nojoumian, M.
    Stinson, D. R.
    Grainger, M.
    [J]. IET INFORMATION SECURITY, 2010, 4 (04) : 202 - 211
  • [3] Providing Anonymity in Unconditionally Secure Secret Sharing Schemes
    Mida Guillermo
    Keith M. Martin
    Christine M. O'Keefe
    [J]. Designs, Codes and Cryptography, 2003, 28 : 227 - 245
  • [4] Providing anonymity in unconditionally secure secret sharing schemes
    Guillermo, M
    Martin, KM
    O'Keefe, CM
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2003, 28 (03) : 227 - 245
  • [5] Strongly secure ramp secret sharing schemes
    Iwamoto, M
    Yamamoto, H
    [J]. 2005 IEEE International Symposium on Information Theory (ISIT), Vols 1 and 2, 2005, : 1221 - 1225
  • [6] Quantum strongly secure ramp secret sharing
    Zhang, Paul
    Matsumoto, Ryutaroh
    [J]. QUANTUM INFORMATION PROCESSING, 2015, 14 (02) : 715 - 729
  • [7] Quantum strongly secure ramp secret sharing
    Paul Zhang
    Ryutaroh Matsumoto
    [J]. Quantum Information Processing, 2015, 14 : 715 - 729
  • [8] Unconditionally Secure Rational Secret Sharing in Standard Communication Networks
    Zhang, Zhifang
    Liu, Mulan
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 355 - 369
  • [9] Unconditionally secure proactive secret sharing scheme with combinatorial structures
    Stinson, DR
    Wei, R
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, PROCEEDINGS, 2000, 1758 : 200 - 214
  • [10] UNCONDITIONALLY SECURE FAIR (t, n)-SECRET SHARING SCHEME
    Al Mahmoud, Qassim
    Besoul, Khaldoun
    Alhalaybeh, Ayman
    [J]. ADVANCES AND APPLICATIONS IN DISCRETE MATHEMATICS, 2023, 38 (01): : 127 - 143