Linear Secret-Sharing Schemes for Forbidden Graph Access Structures

被引:1
|
作者
Beimel, Amos [1 ]
Farras, Oriol [2 ]
Mintz, Yuval [1 ]
Peter, Naty [3 ]
机构
[1] Ben Gurion Univ Negev, Dept Comp Sci, IL-8410501 Beer Sheva, Israel
[2] Univ Rovira & Virgili, Dept Comp Engn & Math, Tarragona 43007, Spain
[3] Tel Aviv Univ, Dept Elect Engn Syst, IL-6997801 Tel Aviv, Israel
基金
以色列科学基金会; 欧盟地平线“2020”;
关键词
Secret-sharing; share size; monotone span program; conditional disclosure of secrets; DECOMPOSITION; SIZE;
D O I
10.1109/TIT.2021.3132917
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A secret-sharing scheme realizes the forbidden graph access structure determined by a graph G = (V, E) if the parties are the vertices of the graph and the subsets that can reconstruct the secret are the pairs of vertices in E (i.e., the edges) and the subsets of at least three vertices. Secret-sharing schemes for forbidden graph access structures defined by bipartite graphs are equivalent to conditional disclosure of secrets (CDS) protocols. We study the complexity of realizing a forbidden graph access structure by linear secret-sharing schemes, which are schemes in which the secret can be reconstructed from the shares by a linear mapping. We provide efficient constructions and lower bounds on the share size of linear secret- sharing schemes for sparse and very dense graphs, closing the gap between upper and lower bounds. Given a sparse (resp. very dense) graph with n vertices and at most n(1+beta) edges (resp. at least ((n)(2)) - n(1+beta) edges), for some 0 <= beta < 1, we construct a linear secret-sharing scheme realizing its forbidden graph access structure with total share size <(O)over tilde>(n(1+beta/2)). Furthermore, we construct linear secretsharing schemes realizing these access structures in which the size of each share is (O) over tilde (n(1/4+beta/4)). We also provide constructions achieving different trade-offs between the size of each share and the total share size. We prove that almost all forbidden graph access structures require linear secret-sharing schemes with total share size Omega(n(3/2)); this shows that the construction of Gay, Kerenidis, and Wee [CRYPTO 2015] is optimal. Furthermore, we show that for every 0 <= beta < 1 there exist a graph with at most n(1+beta) edges and a graph with at least ((n)(2)) - n(1+beta) edges such that the total share size in any linear secret-sharing scheme realizing the associated forbidden graph access structures is Omega(n(1+beta/2)). Finally, we show that for every 0 <= beta < 1 there exist a graph with at most n(1+beta) edges and a graph with at least ((n)(2)) - n(1+beta) edges such that the size of the share of at least one party in any linear secret-sharing scheme realizing these forbidden graph access structures is Omega(n(1/4+beta/4)). This shows that our constructions are optimal (up to poly-logarithmic factors).
引用
收藏
页码:2083 / 2100
页数:18
相关论文
共 50 条
  • [1] Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
    Beimel, Amos
    Farras, Oriol
    Mintz, Yuval
    Peter, Naty
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2017, PT II, 2017, 10678 : 394 - 423
  • [2] Secret-Sharing Schemes for General and Uniform Access Structures
    Applebaum, Benny
    Beimel, Amos
    Farras, Oriol
    Nir, Oded
    Peter, Naty
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT III, 2019, 11478 : 441 - 471
  • [3] The access structure of some secret-sharing schemes
    Renvall, A
    Ding, CS
    [J]. INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 67 - 78
  • [4] Multi-linear Secret-Sharing Schemes
    Beimel, Amos
    Ben-Efraim, Aner
    Padro, Carles
    Tyomkin, Ilya
    [J]. THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 394 - 418
  • [5] Optimal linear secret sharing schemes for graph access structures on six participants
    Gharahi, Motahhareh
    Khazaei, Shahram
    [J]. THEORETICAL COMPUTER SCIENCE, 2019, 771 : 1 - 8
  • [6] The Share Size of Secret-Sharing Schemes for Almost All Access Structures and Graphs
    Beimel, Amos
    Farras, Oriol
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2020, PT III, 2020, 12552 : 499 - 529
  • [7] Linear secret sharing schemes and rearrangements of access structures
    Xiao L.-L.
    Liu M.-L.
    [J]. Acta Mathematicae Applicatae Sinica, 2004, 20 (4) : 685 - 694
  • [8] New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structures
    Lu, Hui-Chuan
    Fu, Hung-Lin
    [J]. INFORMATION SCIENCES, 2013, 240 : 83 - 94
  • [9] Security of Linear Secret-Sharing Schemes Against Mass Surveillance
    Giacomelli, Irene
    Olimid, Ruxandra F.
    Ranellucci, Samuel
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 43 - 58
  • [10] Perfect secret sharing schemes for graph access structures on six participants
    Gharahi, Motahhareh
    Dehkordi, Massoud Hadian
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2013, 7 (02) : 143 - 146