Linear Secret-Sharing Schemes for Forbidden Graph Access Structures

被引:1
|
作者
Beimel, Amos [1 ]
Farras, Oriol [2 ]
Mintz, Yuval [1 ]
Peter, Naty [3 ]
机构
[1] Ben Gurion Univ Negev, Dept Comp Sci, IL-8410501 Beer Sheva, Israel
[2] Univ Rovira & Virgili, Dept Comp Engn & Math, Tarragona 43007, Spain
[3] Tel Aviv Univ, Dept Elect Engn Syst, IL-6997801 Tel Aviv, Israel
基金
欧盟地平线“2020”; 以色列科学基金会;
关键词
Secret-sharing; share size; monotone span program; conditional disclosure of secrets; DECOMPOSITION; SIZE;
D O I
10.1109/TIT.2021.3132917
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A secret-sharing scheme realizes the forbidden graph access structure determined by a graph G = (V, E) if the parties are the vertices of the graph and the subsets that can reconstruct the secret are the pairs of vertices in E (i.e., the edges) and the subsets of at least three vertices. Secret-sharing schemes for forbidden graph access structures defined by bipartite graphs are equivalent to conditional disclosure of secrets (CDS) protocols. We study the complexity of realizing a forbidden graph access structure by linear secret-sharing schemes, which are schemes in which the secret can be reconstructed from the shares by a linear mapping. We provide efficient constructions and lower bounds on the share size of linear secret- sharing schemes for sparse and very dense graphs, closing the gap between upper and lower bounds. Given a sparse (resp. very dense) graph with n vertices and at most n(1+beta) edges (resp. at least ((n)(2)) - n(1+beta) edges), for some 0 <= beta < 1, we construct a linear secret-sharing scheme realizing its forbidden graph access structure with total share size <(O)over tilde>(n(1+beta/2)). Furthermore, we construct linear secretsharing schemes realizing these access structures in which the size of each share is (O) over tilde (n(1/4+beta/4)). We also provide constructions achieving different trade-offs between the size of each share and the total share size. We prove that almost all forbidden graph access structures require linear secret-sharing schemes with total share size Omega(n(3/2)); this shows that the construction of Gay, Kerenidis, and Wee [CRYPTO 2015] is optimal. Furthermore, we show that for every 0 <= beta < 1 there exist a graph with at most n(1+beta) edges and a graph with at least ((n)(2)) - n(1+beta) edges such that the total share size in any linear secret-sharing scheme realizing the associated forbidden graph access structures is Omega(n(1+beta/2)). Finally, we show that for every 0 <= beta < 1 there exist a graph with at most n(1+beta) edges and a graph with at least ((n)(2)) - n(1+beta) edges such that the size of the share of at least one party in any linear secret-sharing scheme realizing these forbidden graph access structures is Omega(n(1/4+beta/4)). This shows that our constructions are optimal (up to poly-logarithmic factors).
引用
收藏
页码:2083 / 2100
页数:18
相关论文
共 50 条
  • [41] Secret Sharing Schemes for (k, n)-Consecutive Access Structures
    Herranz, Javier
    Saez, German
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2018, 2018, 11124 : 463 - 480
  • [42] ON SECRET-SHARING MATROIDS
    SEYMOUR, PD
    [J]. JOURNAL OF COMBINATORIAL THEORY SERIES B, 1992, 56 (01) : 69 - 73
  • [43] The quantum secret sharing schemes based on hyperstar access structures
    Li, Lei
    Li, Zhi
    [J]. INFORMATION SCIENCES, 2024, 664
  • [44] Efficient secret sharing schemes realizing general access structures
    Tochikubo, K
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (07) : 1788 - 1797
  • [45] Secret-Sharing for NP
    Komargodski, Ilan
    Naor, Moni
    Yogev, Eylon
    [J]. JOURNAL OF CRYPTOLOGY, 2017, 30 (02) : 444 - 469
  • [46] Secret-Sharing for NP
    Ilan Komargodski
    Moni Naor
    Eylon Yogev
    [J]. Journal of Cryptology, 2017, 30 : 444 - 469
  • [47] GRAPH DECOMPOSITIONS AND SECRET SHARING SCHEMES
    BLUNDO, C
    DESANTIS, A
    STINSON, DR
    VACCARO, U
    [J]. JOURNAL OF CRYPTOLOGY, 1995, 8 (01) : 39 - 64
  • [48] Secret-Sharing for NP
    Komargodski, Ilan
    Naor, Moni
    Yogev, Eylon
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT II, 2014, 8874 : 254 - 273
  • [49] Secret sharing schemes on access structures with intersection number equal to one
    Martí-Farré, J
    Padró, C
    [J]. SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 354 - 363
  • [50] Ideal and Computationally Perfect Secret Sharing Schemes for Generalized Access Structures
    Pattipati, Dileep Kumar
    Tentu, Appala Naidu
    Venkaiah, V. Ch.
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 149 - 161