Multi-linear Secret-Sharing Schemes

被引:0
|
作者
Beimel, Amos [1 ]
Ben-Efraim, Aner [1 ,2 ]
Padro, Carles [3 ]
Tyomkin, Ilya [2 ]
机构
[1] Ben Gurion Univ Negev, Dept Comp Sci, Beer Sheva, Israel
[2] Ben Gurion Univ Negev, Dept Math, Beer Sheva, Israel
[3] Nanyang Technol Univ, Singapore, Singapore
来源
关键词
Ideal secret-sharing schemes; multi-linear matroids; Dowling geometries; MONOTONE SPAN PROGRAMS; PARTIAL FIELDS; LOWER BOUNDS; REPRESENTATIONS; CONSTRUCTIONS; MATROIDS; SIZE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Multi-linear secret-sharing schemes are the most common secret-sharing schemes. In these schemes the secret is composed of some field elements and the sharing is done by applying some fixed linear mapping on the field elements of the secret and some randomly chosen field elements. If the secret contains one field element, then the scheme is called linear. The importance of multi-linear schemes is that they provide a simple non-interactive mechanism for computing shares of linear combinations of previously shared secrets. Thus, they can be easily used in cryptographic protocols. In this work we study the power of multi-linear secret-sharing schemes. On one hand, we prove that ideal multi-linear secret-sharing schemes in which the secret is composed of p field elements are more powerful than schemes in which the secret is composed of less than p field elements (for every prime p). On the other hand, we prove super-polynomial lower bounds on the share size in multi-linear secret-sharing schemes. Previously, such lower bounds were known only for linear schemes.
引用
收藏
页码:394 / 418
页数:25
相关论文
共 50 条
  • [1] Security of Linear Secret-Sharing Schemes Against Mass Surveillance
    Giacomelli, Irene
    Olimid, Ruxandra F.
    Ranellucci, Samuel
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 43 - 58
  • [2] Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
    Beimel, Amos
    Farras, Oriol
    Mintz, Yuval
    Peter, Naty
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2017, PT II, 2017, 10678 : 394 - 423
  • [3] Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
    Beimel, Amos
    Farras, Oriol
    Mintz, Yuval
    Peter, Naty
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (03) : 2083 - 2100
  • [4] UNIVERSALLY IDEAL SECRET-SHARING SCHEMES
    BEIMEL, A
    CHOR, B
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (03) : 786 - 794
  • [5] Evolving Ramp Secret-Sharing Schemes
    Beimel, Amos
    Othman, Hussien
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 313 - 332
  • [6] Universally ideal secret-sharing schemes
    [J]. Beimel, Amos, 1600, IEEE, Piscataway, NJ, United States (40):
  • [7] Improved Polynomial Secret-Sharing Schemes
    Beimel, Amos
    Farras, Oriol
    Lasri, Or
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2023, PT II, 2023, 14370 : 374 - 405
  • [8] DECOMPOSITION CONSTRUCTIONS FOR SECRET-SHARING SCHEMES
    STINSON, DR
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (01) : 118 - 125
  • [9] Improving quantum secret-sharing schemes
    Nascimento, ACA
    Mueller-Quade, J
    Imai, H
    [J]. PHYSICAL REVIEW A, 2001, 64 (04): : 423111 - 423115
  • [10] Generalized semiquantum secret-sharing schemes
    Gheorghiu, Vlad
    [J]. PHYSICAL REVIEW A, 2012, 85 (05):