Robust Secret Sharing Schemes Against Local Adversaries

被引:7
|
作者
Bishop, Allison [1 ]
Pastro, Valerio [1 ]
机构
[1] Columbia Univ, New York, NY 10027 USA
来源
关键词
D O I
10.1007/978-3-662-49387-8_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study robust secret sharing schemes in which between one third and one half of the players are corrupted. In this scenario, robust secret sharing is possible only with a share size larger than the secrets, and allowing a positive probability of reconstructing the wrong secret. We focus on the most challenging case where the number corruptions is just one less than the number of honest players. In the standard model, it is known that at least m + k bits per share are needed to robustly share a secret of bit-length m with an error probability of 2-k; however, to the best of our knowledge, no efficient scheme matches this lower bound: the one that gets closest has share size m+ O (n+ k), where n is the number of players in the scheme. We show that it is possible to obtain schemes with close to minimal share size in a model of local adversaries, i. e. in which corrupt players cannot communicate between receiving their respective honest shares and submitting corrupted shares to the reconstruction procedure, but may coordinate before the execution of the protocol and can also gather information afterwards. In this limited adversarial model, we prove a lower bound of roughly m + k bits on the minimal share size, which is (somewhat surprisingly) similar to the lower bound in the standard model, where much stronger adversaries are allowed. We then present efficient scheme that essentially meets our lower bound, and has shorter share size than any known efficient construction in the standard model for the same set of parameters. For our construction, we introduce a novel procedure that compiles an error correcting code into a new randomized one, with the following two properties: a single local portion of a codeword leaks no information on the encoded message itself, and any set of portions of a codeword reconstructs the message with error probability exponentially low in the set size.
引用
收藏
页码:327 / 356
页数:30
相关论文
共 50 条
  • [21] Secret sharing schemes on graphs
    Csirmaz, Laszlo
    [J]. STUDIA SCIENTIARUM MATHEMATICARUM HUNGARICA, 2007, 44 (03) : 297 - 306
  • [22] Partial Secret Sharing Schemes
    Jafari, Amir
    Khazaei, Shahram
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (08) : 5364 - 5385
  • [23] Anonymous secret sharing schemes
    Blundo, C
    Stinson, DR
    [J]. DISCRETE APPLIED MATHEMATICS, 1997, 77 (01) : 13 - 28
  • [24] Efficient Secret Sharing Schemes
    Lv, Chunli
    Jia, Xiaoqi
    Lin, Jingqiang
    Jing, Jiwu
    Tian, Lijun
    Sun, Mingli
    [J]. SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 114 - +
  • [25] Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes
    Eriguchi, Reo
    Kunihiro, Noboru
    [J]. 2019 IEEE INFORMATION THEORY WORKSHOP (ITW), 2019, : 264 - 268
  • [26] Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters
    Adhikari, Avishek
    Morozov, Kirill
    Obana, Satoshi
    Roy, Partha Sarathi
    Sakurai, Kouichi
    Xu, Rui
    [J]. INFORMATION THEORETIC SECURITY, ICITS 2016, 2016, 10015 : 3 - 23
  • [27] Security of Linear Secret-Sharing Schemes Against Mass Surveillance
    Giacomelli, Irene
    Olimid, Ruxandra F.
    Ranellucci, Samuel
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 43 - 58
  • [28] Visual secret sharing schemes for plural secret images
    Iwamoto, M
    Yamamoto, H
    [J]. 2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 283 - 283
  • [29] Verifiable Secret Redistribution for Proactive Secret Sharing Schemes
    于佳
    孔凡玉
    李大兴
    [J]. Journal of Shanghai Jiaotong University(Science), 2006, (02) : 236 - 241
  • [30] Encryption Schemes Secure Against Profiling Adversaries
    Diaz-Santiago, Sandra
    Chakraborty, Debrup
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2012, 2014, 455 : 172 - 191