Constructing Locally Leakage-Resilient Linear Secret-Sharing Schemes

被引:7
|
作者
Maji, Hemanta K. [1 ]
Paskin-Cherniavsky, Anat [2 ]
Suad, Tom [2 ]
Wang, Mingyuan [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Ariel Univ, Dept Comp Sci, Ariel, Israel
关键词
Local leakage-resilience; Massey secret-sharing scheme; Random linear codes; Shamir's secret-sharing scheme; Discrete fourier analysis; REED-SOLOMON CODES;
D O I
10.1007/978-3-030-84252-9_26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Innovative side-channel attacks have repeatedly falsified the assumption that cryptographic implementations are opaque black-boxes. Therefore, it is essential to ensure cryptographic constructions' security even when information leaks via unforeseen avenues. One such fundamental cryptographic primitive is the secret-sharing schemes, which underlies nearly all threshold cryptography. Our understanding of the leakageresilience of secret-sharing schemes is still in its preliminary stage. This work studies locally leakage-resilient linear secret-sharing schemes. An adversary can leak m bits of arbitrary local leakage from each n secret shares. However, in a locally leakage-resilient secret-sharing scheme, the leakage's joint distribution reveals no additional information about the secret. For every constant m, we prove that the Massey secret-sharing scheme corresponding to a random linear code of dimension k (over sufficiently large prime fields) is locally leakage-resilient, where k/n > 1/2 is a constant. The previous best construction by Benhamouda, Degwekar, Ishai, Rabin (CRYPTO-2018) needed k/n > 0.907. A technical challenge arises because the number of all possible m-bit local leakage functions is exponentially larger than the number of random linear codes. Our technical innovation begins with identifying an appropriate pseudorandomness-inspired family of tests; passing them suffices to ensure leakage-resilience. We show that most linear codes pass all tests in this family. This Monte-Carlo construction of linear secret-sharing scheme that is locally leakage-resilient has applications to leakage-resilient secure computation. Furthermore, we highlight a crucial bottleneck for all the analytical approaches in this line of work. Benhamouda et al. introduced an analytical proxy to study the leakage-resilience of secret-sharing schemes; if the proxy is small, then the scheme is leakage-resilient. However, we present a one-bit local leakage function demonstrating that the converse is false, motivating the need for new analytically well-behaved functions that capture leakage-resilience more accurately. Technically, the analysis involves probabilistic and combinatorial techniques and (discrete) Fourier analysis. The family of new "tests" capturing local leakage functions, we believe, is of independent and broader interest.
引用
收藏
页码:779 / 808
页数:30
相关论文
共 50 条
  • [31] On the Local Leakage Resilience of Linear Secret Sharing Schemes
    Benhamouda, Fabrice
    Degwekar, Akshay
    Ishai, Yuval
    Rabin, Tal
    [J]. JOURNAL OF CRYPTOLOGY, 2021, 34 (02)
  • [32] Secret-Sharing Schemes for Very Dense Graphs
    Beimel, Amos
    Mintz, Yuval
    Farras, Oriol
    [J]. JOURNAL OF CRYPTOLOGY, 2016, 29 (02) : 336 - 362
  • [33] Secret-Sharing Schemes for Very Dense Graphs
    Amos Beimel
    Oriol Farràs
    Yuval Mintz
    [J]. Journal of Cryptology, 2016, 29 : 336 - 362
  • [34] The access structure of some secret-sharing schemes
    Renvall, A
    Ding, CS
    [J]. INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 67 - 78
  • [35] Group Identification via Non-threshold Leakage-Resilient Secret Sharing Scheme
    Li, Ping
    Li, Jin
    Hassan, Alzubair
    [J]. CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 234 - 241
  • [36] Short Leakage Resilient and Non-malleable Secret Sharing Schemes
    Chandran, Nishanth
    Kanukurthi, Bhavana
    Obbattu, Sai Lakshmi Bhavana
    Sekar, Sruthi
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT I, 2022, 13507 : 178 - 207
  • [37] On codes, matroids, and secure multiparty computation from linear secret-sharing schemes
    Cramer, Ronald
    Daza, Vanesa
    Gracia, Ignacio
    Urroz, Jorge Jimenez
    Leander, Gregor
    Marti-Farre, Jaume
    Padro, Carles
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2644 - 2657
  • [38] Memory Leakage-resilient Multi-stage Secret Sharing Scheme with General Access Structures
    Song, Yun
    Li, Zhi-Hui
    Wang, Wen-Hua
    [J]. Ruan Jian Xue Bao/Journal of Software, 2022, 33 (10): : 3891 - 3902
  • [39] Leakage Resilient Secret Sharing and Applications
    Srinivasan, Akshayaram
    Vasudevan, Prashant Nalini
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 : 480 - 509
  • [40] Secret-Sharing Schemes for General and Uniform Access Structures
    Applebaum, Benny
    Beimel, Amos
    Farras, Oriol
    Nir, Oded
    Peter, Naty
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT III, 2019, 11478 : 441 - 471