Quadratic Secret Sharing and Conditional Disclosure of Secrets

被引:4
|
作者
Beimel, Amos [1 ]
Othman, Hussien [1 ]
Peter, Naty [2 ]
机构
[1] Ben Gurion Univ Negev, Beer Sheva, Israel
[2] Tel Aviv Univ, Tel Aviv, Israel
基金
以色列科学基金会; 欧洲研究理事会; 欧盟地平线“2020”;
关键词
EXPONENTIAL LOWER BOUNDS; MONOTONE; COMPLEXITY; SIZE;
D O I
10.1007/978-3-030-84252-9_25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There is a huge gap between the upper and lower bounds on the share size of secret-sharing schemes for arbitrary n-party access structures, and consistent with our current knowledge the optimal share size can be anywhere between polynomial in n and exponential in n. For linear secret-sharing schemes, we know that the share size for almost all n-party access structures must be exponential in n. Furthermore, most constructions of efficient secret-sharing schemes are linear. We would like to study larger classes of secret-sharing schemes with two goals. On one hand, we want to prove lower bounds for larger classes of secret-haring schemes, possibly shedding some light on the share size of general secret-sharing schemes. On the other hand, we want to construct efficient secret-sharing schemes for access structures that do not have efficient linear secret-sharing schemes. Given this motivation, Paskin-Cherniavsky and Radune (ITC'20) defined and studied a new class of secret-sharing schemes in which the shares are generated by applying degree-d polynomials to the secret and some random field elements. The special case d = 1 corresponds to linear and multi-linear secret-sharing schemes. We define and study two additional classes of polynomial secretsharing schemes: (1) schemes in which for every authorized set the reconstruction of the secret is done using polynomials and (2) schemes in which both sharing and reconstruction are done by polynomials. For linear secret-sharing schemes, schemes with linear sharing and schemes with linear reconstruction are equivalent. We give evidence that for polynomial secret-sharing schemes, schemes with polynomial sharing are probably stronger than schemes with polynomial reconstruction. We also prove lower bounds on the share size for schemes with polynomial reconstruction. On the positive side, we provide constructions of secret-aring schemes and conditional disclosure of secrets (CDS) protocols with quadratic sharing and reconstruction. We extend a construction of Liu et al. (CRYPTO'17) and construct optimal quadratic k-server CDS protocols for functions f : [N](k) ->{0, 1} with message size O(N(k-1)/3). We show how to transform our quadratic k-server CDS protocol to a robust CDS protocol, and use the robust CDS protocol to construct quadratic secret-sharing schemes for arbitrary access structures with share size O(2(0.705n)); this is better than the best known share size of O(2(0.7576n)) for linear secret-sharing schemes and worse than the best known share size of O(2(0.585n)) for general secret-sharing schemes.
引用
收藏
页码:748 / 778
页数:31
相关论文
共 50 条
  • [1] Quadratic Secret Sharing and Conditional Disclosure of Secrets
    Beimel, Amos
    Othman, Hussien
    Peter, Naty
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (11) : 7295 - 7316
  • [2] Better Secret Sharing via Robust Conditional Disclosure of Secrets
    Applebaum, Benny
    Beimel, Amos
    Nir, Oded
    Peter, Naty
    [J]. PROCEEDINGS OF THE 52ND ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING (STOC '20), 2020, : 280 - 293
  • [3] Evolving Conditional Disclosure of Secrets
    Peter, Naty
    [J]. INFORMATION SECURITY, ISC 2023, 2023, 14411 : 327 - 347
  • [4] On the Linear Capacity of Conditional Disclosure of Secrets
    Li, Zhou
    Sun, Hua
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2023, 71 (12) : 7218 - 7227
  • [5] On the Linear Capacity of Conditional Disclosure of Secrets
    Li, Zhou
    Sun, Hua
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 3202 - 3207
  • [6] Laconic Conditional Disclosure of Secrets and Applications
    Doettling, Nico
    Garg, Sanjam
    Goyal, Vipul
    Malavolta, Giulio
    [J]. 2019 IEEE 60TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2019), 2019, : 661 - 685
  • [7] Visual secret sharing for multiple secrets
    Feng, Jen-Bang
    Wu, Hsien-Chu
    Tsai, Chwei-Shyong
    Chang, Ya-Fen
    Chu, Yen-Ping
    [J]. PATTERN RECOGNITION, 2008, 41 (12) : 3572 - 3581
  • [8] SHARING SECRETS - DISCLOSURE AND DISCRETION IN DYADS AND TRIADS
    TAYLOR, RB
    DESOTO, CB
    LIEB, R
    [J]. JOURNAL OF PERSONALITY AND SOCIAL PSYCHOLOGY, 1979, 37 (07) : 1196 - 1203
  • [9] Sharing one secret vs. sharing many secrets
    Di Crescenzo, G
    [J]. THEORETICAL COMPUTER SCIENCE, 2003, 295 (1-3) : 123 - 140
  • [10] Multi-secrets Visual Secret Sharing
    Chen, Tzung-Her
    Tsao, Kai-Hsiang
    Wu, Chang-Sian
    [J]. 2008 14TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS, (APCC), VOLS 1 AND 2, 2008, : 491 - 495