Constructing Locally Leakage-Resilient Linear Secret-Sharing Schemes

被引:7
|
作者
Maji, Hemanta K. [1 ]
Paskin-Cherniavsky, Anat [2 ]
Suad, Tom [2 ]
Wang, Mingyuan [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Ariel Univ, Dept Comp Sci, Ariel, Israel
关键词
Local leakage-resilience; Massey secret-sharing scheme; Random linear codes; Shamir's secret-sharing scheme; Discrete fourier analysis; REED-SOLOMON CODES;
D O I
10.1007/978-3-030-84252-9_26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Innovative side-channel attacks have repeatedly falsified the assumption that cryptographic implementations are opaque black-boxes. Therefore, it is essential to ensure cryptographic constructions' security even when information leaks via unforeseen avenues. One such fundamental cryptographic primitive is the secret-sharing schemes, which underlies nearly all threshold cryptography. Our understanding of the leakageresilience of secret-sharing schemes is still in its preliminary stage. This work studies locally leakage-resilient linear secret-sharing schemes. An adversary can leak m bits of arbitrary local leakage from each n secret shares. However, in a locally leakage-resilient secret-sharing scheme, the leakage's joint distribution reveals no additional information about the secret. For every constant m, we prove that the Massey secret-sharing scheme corresponding to a random linear code of dimension k (over sufficiently large prime fields) is locally leakage-resilient, where k/n > 1/2 is a constant. The previous best construction by Benhamouda, Degwekar, Ishai, Rabin (CRYPTO-2018) needed k/n > 0.907. A technical challenge arises because the number of all possible m-bit local leakage functions is exponentially larger than the number of random linear codes. Our technical innovation begins with identifying an appropriate pseudorandomness-inspired family of tests; passing them suffices to ensure leakage-resilience. We show that most linear codes pass all tests in this family. This Monte-Carlo construction of linear secret-sharing scheme that is locally leakage-resilient has applications to leakage-resilient secure computation. Furthermore, we highlight a crucial bottleneck for all the analytical approaches in this line of work. Benhamouda et al. introduced an analytical proxy to study the leakage-resilience of secret-sharing schemes; if the proxy is small, then the scheme is leakage-resilient. However, we present a one-bit local leakage function demonstrating that the converse is false, motivating the need for new analytically well-behaved functions that capture leakage-resilience more accurately. Technically, the analysis involves probabilistic and combinatorial techniques and (discrete) Fourier analysis. The family of new "tests" capturing local leakage functions, we believe, is of independent and broader interest.
引用
收藏
页码:779 / 808
页数:30
相关论文
共 50 条
  • [1] A Lower Bound on the Share Size of Leakage-Resilient Secret-Sharing Schemes
    Dutta, Sabyasachi
    Jiang, Shaoquan
    Safavi-Naini, Reihaneh
    [J]. NEW ADVANCES IN DESIGNS, CODES AND CRYPTOGRAPHY, NADCC 2022, 2024, 86 : 125 - 139
  • [2] Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks
    Adams, Donald Q.
    Maji, Hemanta K.
    Nguyen, Hai H.
    Nguyen, Minh L.
    Paskin-Cherniavsky, Anat
    Suad, Tom
    Wang, Mingyuan
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 976 - 981
  • [3] Memory leakage-resilient secret sharing schemes
    DAI ShuGuang
    WEI JinFeng
    ZHANG FangGuo
    [J]. Science China(Information Sciences), 2015, 58 (11) : 191 - 199
  • [4] Memory leakage-resilient secret sharing schemes
    Dai ShuGuang
    Wei JinFeng
    Zhang FangGuo
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (11) : 1 - 9
  • [5] Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family
    Maji, Hemanta K.
    Nguyen, Hai H.
    Paskin-Cherniavsky, Anat
    Suad, Tom
    Wang, Mingyuan
    Ye, Xiuyu
    Yu, Albert
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2022, PT I, 2022, 13747 : 355 - 383
  • [6] Lower Bounds for Leakage-Resilient Secret Sharing
    Nielsen, Jesper Buus
    Simkin, Mark
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 556 - 577
  • [7] Constructing Leakage-Resilient Shamir's Secret Sharing: Over Composite Order Fields
    Maji, Hemanta K.
    Nguyen, Hai H.
    Paskin-Cherniaysky, Anat
    Ye, Xiuyu
    [J]. ADVANCES IN CRYPTOLOGY, PT IV, EUROCRYPT 2024, 2024, 14654 : 286 - 315
  • [8] Stronger Lower Bounds for Leakage-Resilient Secret Sharing
    Hoffmann, Charlotte
    Simkin, Mark
    [J]. PROGRESS IN CRYPTOLOGY, LATINCRYPT 2023, 2023, 14168 : 215 - 228
  • [9] Leakage-Resilient Secret Sharing Against Colluding Parties
    Kumar, Ashutosh
    Meka, Raghu
    Sahai, Amit
    [J]. 2019 IEEE 60TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2019), 2019, : 636 - 660
  • [10] Leakage-Resilient Secret Sharing With Constant Share Size
    Tjuawinata, Ivan
    Xing, Chaoping
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (12) : 8228 - 8250