Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience

被引:0
|
作者
Patra, Arpita [1 ]
Choudhary, Ashish [1 ]
Rangan, C. Pandu [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Madras 600036, Tamil Nadu, India
来源
关键词
SECURE MULTIPARTY COMPUTATION; ROUND COMPLEXITY; PROTOCOLS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a new statistical asynchronous verifiable secret sharing (AVSS) protocol with optimal resilience; i.e. with n = 3t + 1, where n is the total number of participating parties and t is the maximum number of parties that can be under the control of a computationally unbounded active adversary A(t). Our protocol privately communicates O((ln(3) + n(4)kappa)kappa) bits and A-casts O(n(3) log(n)) bits to simultaneously share l >= 1 elements from a finite field F, where kappa is the error parameter. There are only two known statistical AVSS protocols with n = 3t + 1, reported in [11] and [26]. The AVSS protocol of [11] requires a private communication of O(n(9)kappa(4)) bits and A-cast of O(n(9)kappa(2) log(n)) bits to share a single element from F. Thus our AVSS protocol shows a significant improvement in communication complexity over the AVSS of [11]. The AVSS protocol of [26] requires a private communication of O((ln(3) + n(4))kappa) bits and A-cast of O((ln(3) + n(4))kappa) bits to share l >= 1 elements. However, the shared element(s) may be NULL is not an element of F. Thus our AVSS is better than the AVSS of [26] due to two reasons: (a) The A-cast communication of our AVSS is independent of the number of secrets i.e. l; (b) Our AVSS makes sure that the shared value(s) always belong to F. Using our AVSS, we design a new primitive called Asynchronous Complete Secret Sharing (ACSS) which is an essential building block of asynchronous multiparty computation (AMPC). Using our ACSS scheme, we can design a statistical AMPC with optimal resilience; i.e., with n = 3t + 1, that privately communicates O(n(5) kappa) bits per multiplication gate. This will significantly improve the only known statistical AMPC of [8] with n = 3t + 1, which privately communicates Omega(n(11) kappa(4)) bits and A-cast Omega(n(11) kappa(2) log(n)) bits per multiplication gate.
引用
收藏
页码:74 / 92
页数:19
相关论文
共 50 条
  • [31] Verifiable Quantum Secret Sharing Protocol Based on Secret Authentication
    Du Yutao
    Bao Wansu
    Li Tan
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (01) : 212 - 217
  • [32] Simple and Efficient Asynchronous Byzantine Agreement with Optimal Resilience
    Patra, Arpita
    Choudhary, Ashish
    Rangan, C. Pandu
    [J]. PODC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, 2009, : 92 - 101
  • [33] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    [J]. INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [34] Publicly verifiable secret sharing technology in blockchain
    He, Miao
    Bai, Fen-Hua
    Yu, Zhuo
    Shen, Tao
    [J]. Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2022, 56 (02): : 306 - 312
  • [35] Publicly verifiable secret sharing with enrollment ability
    Yu, Jia
    Kong, Fanyu
    Hao, Rong
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 194 - +
  • [36] Necessity and realization of universally verifiable secret sharing
    Mao, WB
    [J]. 1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, : 208 - 214
  • [37] Verifiable secret sharing with changeable access structure
    Ghebleh, Mohammad
    Kanso, Ali
    Abuhasan, Haya
    [J]. DISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS, 2024,
  • [38] A New, Publicly Verifiable, Secret Sharing Scheme
    Behnad, A.
    Eghlidos, T.
    [J]. SCIENTIA IRANICA, 2008, 15 (02) : 246 - 251
  • [39] Verifiable hybrid secret sharing with few qubits
    Lipinska, Victoria
    Murta, Glaucia
    Ribeiro, Jeremy
    Wehner, Stephanie
    [J]. PHYSICAL REVIEW A, 2020, 101 (03)
  • [40] A quantum secret sharing scheme with verifiable function
    Li-Juan Liu
    Zhi-Hui Li
    Zhao-Wei Han
    Dan-Li Zhi
    [J]. The European Physical Journal D, 2020, 74