Leakage-Resilient Secret Sharing With Constant Share Size

被引:1
|
作者
Tjuawinata, Ivan [1 ]
Xing, Chaoping [2 ]
机构
[1] Nanyang Technol Univ, Strateg Ctr Res Privacy Preserving Technol & Syst, Singapore 637553, Singapore
[2] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
基金
新加坡国家研究基金会;
关键词
Secret sharing scheme; algebraic geometric code; leakage-resilience;
D O I
10.1109/TIT.2022.3198407
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we consider the leakage-resilience of algebraic-geometric (AG for short) codes based ramp secret sharing schemes extending the analysis on the leakage-resilience of linear threshold secret sharing schemes over prime fields that is done by Benhamouda et al in the effort to construct linear leakage-resilient secret sharing schemes with constant share size. Since there does not exist any explicit efficient construction of AG codes over prime fields with constant field size, we consider constructions over prime fields with the help of concatenation method and constructions of codes over field extensions. Extending the Fourier analysis done by Benhamouda et al., one can show that concatenated algebraic geometric codes over prime fields do produce some nice leakage-resilient secret sharing schemes. One natural and curious question is whether AG codes over extension fields produce better leakage-resilient secret sharing schemes than the construction based on concatenated AG codes. Such construction provides several advantage compared to the construction over prime fields using concatenation method. It is clear that AG codes over extension fields give secret sharing schemes with a smaller reconstruction threshold for a fixed privacy parameter t. In this work, it is also confirmed that indeed AG codes over extension fields have stronger leakage-resilience under some reasonable assumptions. Furthermore, we also show that AG codes over extension fields may provide strong multiplicative property which may be used in its application to the study of multiparty computation. In contrast, the same cannot be said for constructions based on concatenated AG codes, even when we are considering multiplication friendly embeddings. These advantages strongly motivate the study of secret sharing schemes from AG codes over extension fields. The current paper has two main contributions: (i) we obtain leakage-resilient secret sharing schemes with constant share sizes and unbounded numbers of players. Some of the schemes constructed without the use of concatenation also possesses strong multiplicative property (ii) via Fourier Analysis, we analyze the leakage-resilience of secret sharing schemes from codes over extension fields. This is of its own theoretical interest independent of its application to secret sharing schemes from algebraic geometric codes over extension fields.
引用
收藏
页码:8228 / 8250
页数:23
相关论文
共 50 条
  • [1] A Lower Bound on the Share Size of Leakage-Resilient Secret-Sharing Schemes
    Dutta, Sabyasachi
    Jiang, Shaoquan
    Safavi-Naini, Reihaneh
    [J]. NEW ADVANCES IN DESIGNS, CODES AND CRYPTOGRAPHY, NADCC 2022, 2024, 86 : 125 - 139
  • [2] Lower Bounds for Leakage-Resilient Secret Sharing
    Nielsen, Jesper Buus
    Simkin, Mark
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 556 - 577
  • [3] Memory leakage-resilient secret sharing schemes
    DAI ShuGuang
    WEI JinFeng
    ZHANG FangGuo
    [J]. Science China(Information Sciences), 2015, 58 (11) : 191 - 199
  • [4] Memory leakage-resilient secret sharing schemes
    Dai ShuGuang
    Wei JinFeng
    Zhang FangGuo
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (11) : 1 - 9
  • [5] Stronger Lower Bounds for Leakage-Resilient Secret Sharing
    Hoffmann, Charlotte
    Simkin, Mark
    [J]. PROGRESS IN CRYPTOLOGY, LATINCRYPT 2023, 2023, 14168 : 215 - 228
  • [6] Leakage-Resilient Secret Sharing Against Colluding Parties
    Kumar, Ashutosh
    Meka, Raghu
    Sahai, Amit
    [J]. 2019 IEEE 60TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2019), 2019, : 636 - 660
  • [7] Leakage-resilient verifiable multi-secret sharing scheme
    School of Computer Science, Hubei University of Technology, Wuhan
    430068, China
    [J]. Beijing Youdian Daxue Xuebao, 1 (87-91):
  • [8] Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family
    Maji, Hemanta K.
    Nguyen, Hai H.
    Paskin-Cherniavsky, Anat
    Suad, Tom
    Wang, Mingyuan
    Ye, Xiuyu
    Yu, Albert
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2022, PT I, 2022, 13747 : 355 - 383
  • [9] ZK-PCPs from Leakage-Resilient Secret Sharing
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    Weiss, Mor
    [J]. JOURNAL OF CRYPTOLOGY, 2022, 35 (04)
  • [10] ZK-PCPs from Leakage-Resilient Secret Sharing
    Carmit Hazay
    Muthuramakrishnan Venkitasubramaniam
    Mor Weiss
    [J]. Journal of Cryptology, 2022, 35