Constructing Locally Leakage-Resilient Linear Secret-Sharing Schemes

被引:7
|
作者
Maji, Hemanta K. [1 ]
Paskin-Cherniavsky, Anat [2 ]
Suad, Tom [2 ]
Wang, Mingyuan [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Ariel Univ, Dept Comp Sci, Ariel, Israel
关键词
Local leakage-resilience; Massey secret-sharing scheme; Random linear codes; Shamir's secret-sharing scheme; Discrete fourier analysis; REED-SOLOMON CODES;
D O I
10.1007/978-3-030-84252-9_26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Innovative side-channel attacks have repeatedly falsified the assumption that cryptographic implementations are opaque black-boxes. Therefore, it is essential to ensure cryptographic constructions' security even when information leaks via unforeseen avenues. One such fundamental cryptographic primitive is the secret-sharing schemes, which underlies nearly all threshold cryptography. Our understanding of the leakageresilience of secret-sharing schemes is still in its preliminary stage. This work studies locally leakage-resilient linear secret-sharing schemes. An adversary can leak m bits of arbitrary local leakage from each n secret shares. However, in a locally leakage-resilient secret-sharing scheme, the leakage's joint distribution reveals no additional information about the secret. For every constant m, we prove that the Massey secret-sharing scheme corresponding to a random linear code of dimension k (over sufficiently large prime fields) is locally leakage-resilient, where k/n > 1/2 is a constant. The previous best construction by Benhamouda, Degwekar, Ishai, Rabin (CRYPTO-2018) needed k/n > 0.907. A technical challenge arises because the number of all possible m-bit local leakage functions is exponentially larger than the number of random linear codes. Our technical innovation begins with identifying an appropriate pseudorandomness-inspired family of tests; passing them suffices to ensure leakage-resilience. We show that most linear codes pass all tests in this family. This Monte-Carlo construction of linear secret-sharing scheme that is locally leakage-resilient has applications to leakage-resilient secure computation. Furthermore, we highlight a crucial bottleneck for all the analytical approaches in this line of work. Benhamouda et al. introduced an analytical proxy to study the leakage-resilience of secret-sharing schemes; if the proxy is small, then the scheme is leakage-resilient. However, we present a one-bit local leakage function demonstrating that the converse is false, motivating the need for new analytically well-behaved functions that capture leakage-resilience more accurately. Technically, the analysis involves probabilistic and combinatorial techniques and (discrete) Fourier analysis. The family of new "tests" capturing local leakage functions, we believe, is of independent and broader interest.
引用
收藏
页码:779 / 808
页数:30
相关论文
共 50 条
  • [11] Multi-linear Secret-Sharing Schemes
    Beimel, Amos
    Ben-Efraim, Aner
    Padro, Carles
    Tyomkin, Ilya
    [J]. THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 394 - 418
  • [12] Leakage-resilient verifiable multi-secret sharing scheme
    School of Computer Science, Hubei University of Technology, Wuhan
    430068, China
    [J]. Beijing Youdian Daxue Xuebao, 1 (87-91):
  • [13] Stronger Leakage-Resilient and Non-Malleable Secret Sharing Schemes for General Access Structures
    Aggarwal, Divesh
    Damgard, Ivan
    Nielsen, Jesper Buus
    Obremski, Maciej
    Purwanto, Erick
    Ribeiro, Joao
    Simkin, Mark
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 : 510 - 539
  • [14] ZK-PCPs from Leakage-Resilient Secret Sharing
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    Weiss, Mor
    [J]. JOURNAL OF CRYPTOLOGY, 2022, 35 (04)
  • [15] ZK-PCPs from Leakage-Resilient Secret Sharing
    Carmit Hazay
    Muthuramakrishnan Venkitasubramaniam
    Mor Weiss
    [J]. Journal of Cryptology, 2022, 35
  • [16] Leakage Resilient Cheating Detectable Secret Sharing Schemes
    Dutta, Sabyasachi
    Safavi-Naini, Reihaneh
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 3 - 23
  • [17] Security of Linear Secret-Sharing Schemes Against Mass Surveillance
    Giacomelli, Irene
    Olimid, Ruxandra F.
    Ranellucci, Samuel
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 43 - 58
  • [18] Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
    Beimel, Amos
    Farras, Oriol
    Mintz, Yuval
    Peter, Naty
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2017, PT II, 2017, 10678 : 394 - 423
  • [19] Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
    Beimel, Amos
    Farras, Oriol
    Mintz, Yuval
    Peter, Naty
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (03) : 2083 - 2100
  • [20] Memory leakage-resilient secret sharing schemes抗内存泄漏的秘钥共享体制
    ShuGuang Dai
    JinFeng Wei
    FangGuo Zhang
    [J]. Science China Information Sciences, 2015, 58 : 1 - 9