Leakage-Resilient Secret Sharing Against Colluding Parties

被引:17
|
作者
Kumar, Ashutosh [1 ]
Meka, Raghu [1 ]
Sahai, Amit [1 ]
机构
[1] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA 90024 USA
关键词
EXTRACTORS;
D O I
10.1109/FOCS.2019.00045
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this work, we consider the natural goal of designing secret sharing schemes that ensure security against an adversary who may learn some "leaked" information about all the shares. We say that a secret sharing scheme is pparty leakage -resilient, if the secret remains statistically hidden even after a computationally unbounded adversary learns a bounded amount of leakage, where each bit of leakage adaptively and jointly depends on the shares of an adaptively chosen subset of p parties. Existing multi-party secret sharing schemes (Dziembowski and Pietrzak FOCS 07), (Goyal and Kumar STOC 18) and (Benhamouda, Degwekar, Ishai and Rabin CRYPTO 18) have focused on handling non-adaptive and individual leakage for (limited special cases of) threshold secret sharing schemes. We give an unconditional compiler that transforms any secret sharing scheme on n parties into a p-party leakage resilient one for p upto O(log n). This yields the first multi -party secret sharing schemes that are secure against adaptive or joint leakage. As a natural extension, we initiate the study of leakage resilient non-malleable secret sharing. We empower the adversary to adaptively leak from each of the shares and then use the leakage to tamper with all of them arbitrarily and independently. Leveraging our p-party leakage resilient schemes, we compile any secret sharing scheme into a non-malleable one ensuring that any such tampering either preserves the secret or completely 'destroys' it. This improves upon the non-malleable secret sharing scheme of (Goyal and Kumar CRYPTO 18) where no leakage was permitted. Leakage -resilient non-malleable codes can be seen as 2-out-of-2 schemes satisfying our guarantee and have already found many applications in cryptography. Our constructions rely on a clean connection we draw to communication complexity in the well -studied numberon-forehead (NOF) model and rely on functions that have strong communication -complexity lower bounds in the NOF model (in a black-box way). We get efficient pparty leakage-resilient schemes for p upto O(lOg n) as our share sizes have exponential dependence on p. We observe that improving this exponential dependence, even for simultaneous, non -adaptive leakage, will lead to progress on longstanding open problems in complexity theory.
引用
收藏
页码:636 / 660
页数:25
相关论文
共 50 条
  • [1] Lower Bounds for Leakage-Resilient Secret Sharing
    Nielsen, Jesper Buus
    Simkin, Mark
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 556 - 577
  • [2] Memory leakage-resilient secret sharing schemes
    DAI ShuGuang
    WEI JinFeng
    ZHANG FangGuo
    [J]. Science China(Information Sciences), 2015, 58 (11) : 191 - 199
  • [3] Memory leakage-resilient secret sharing schemes
    Dai ShuGuang
    Wei JinFeng
    Zhang FangGuo
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (11) : 1 - 9
  • [4] Stronger Lower Bounds for Leakage-Resilient Secret Sharing
    Hoffmann, Charlotte
    Simkin, Mark
    [J]. PROGRESS IN CRYPTOLOGY, LATINCRYPT 2023, 2023, 14168 : 215 - 228
  • [5] Leakage-Resilient Secret Sharing With Constant Share Size
    Tjuawinata, Ivan
    Xing, Chaoping
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (12) : 8228 - 8250
  • [6] Leakage-resilient verifiable multi-secret sharing scheme
    School of Computer Science, Hubei University of Technology, Wuhan
    430068, China
    [J]. Beijing Youdian Daxue Xuebao, 1 (87-91):
  • [7] Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks
    Adams, Donald Q.
    Maji, Hemanta K.
    Nguyen, Hai H.
    Nguyen, Minh L.
    Paskin-Cherniavsky, Anat
    Suad, Tom
    Wang, Mingyuan
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 976 - 981
  • [8] ZK-PCPs from Leakage-Resilient Secret Sharing
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    Weiss, Mor
    [J]. JOURNAL OF CRYPTOLOGY, 2022, 35 (04)
  • [9] ZK-PCPs from Leakage-Resilient Secret Sharing
    Carmit Hazay
    Muthuramakrishnan Venkitasubramaniam
    Mor Weiss
    [J]. Journal of Cryptology, 2022, 35
  • [10] Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family
    Maji, Hemanta K.
    Nguyen, Hai H.
    Paskin-Cherniavsky, Anat
    Suad, Tom
    Wang, Mingyuan
    Ye, Xiuyu
    Yu, Albert
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2022, PT I, 2022, 13747 : 355 - 383