On the Local Leakage Resilience of Linear Secret Sharing Schemes

被引:0
|
作者
Fabrice Benhamouda
Akshay Degwekar
Yuval Ishai
Tal Rabin
机构
[1] Algorand Foundation,
[2] Two Sigma Investments,undefined
[3] LP,undefined
[4] Technion,undefined
来源
Journal of Cryptology | 2021年 / 34卷
关键词
Leakage resilience; Secret sharing; Fourier analysis;
D O I
暂无
中图分类号
学科分类号
摘要
We consider the following basic question: to what extent are standard secret sharing schemes and protocols for secure multiparty computation that build on them resilient to leakage? We focus on a simple local leakage model, where the adversary can apply an arbitrary function of a bounded output length to the secret state of each party, but cannot otherwise learn joint information about the states. We show that additive secret sharing schemes and high-threshold instances of Shamir’s secret sharing scheme are secure under local leakage attacks when the underlying field is of a large prime order and the number of parties is sufficiently large. This should be contrasted with the fact that any linear secret sharing scheme over a small characteristic field is clearly insecure under local leakage attacks, regardless of the number of parties. Our results are obtained via tools from Fourier analysis and additive combinatorics. We present two types of applications of the above results and techniques. As a positive application, we show that the “GMW protocol” for honest-but-curious parties, when implemented using shared products of random field elements (so-called “Beaver Triples”), is resilient in the local leakage model for sufficiently many parties and over certain fields. This holds even when the adversary has full access to a constant fraction of the views. As a negative application, we rule out multiparty variants of the share conversion scheme used in the 2-party homomorphic secret sharing scheme of Boyle et al. (in: Crypto, 2016).
引用
收藏
相关论文
共 50 条
  • [1] On the Local Leakage Resilience of Linear Secret Sharing Schemes
    Benhamouda, Fabrice
    Degwekar, Akshay
    Ishai, Yuval
    Rabin, Tal
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 531 - 561
  • [2] On the Local Leakage Resilience of Linear Secret Sharing Schemes
    Benhamouda, Fabrice
    Degwekar, Akshay
    Ishai, Yuval
    Rabin, Tal
    [J]. JOURNAL OF CRYPTOLOGY, 2021, 34 (02)
  • [3] Constructing Locally Leakage-Resilient Linear Secret-Sharing Schemes
    Maji, Hemanta K.
    Paskin-Cherniavsky, Anat
    Suad, Tom
    Wang, Mingyuan
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 779 - 808
  • [4] On multiplicative linear secret sharing schemes
    Nikov, V
    Nikova, S
    Preneel, B
    [J]. PROGRESS IN CRYPTOLOGY -INDOCRYPT 2003, 2003, 2904 : 135 - 147
  • [5] A Linear Construction of Secret Sharing Schemes
    Marten van Dijk
    [J]. Designs, Codes and Cryptography, 1997, 12 (2) : 161 - 201
  • [6] Leakage Resilient Cheating Detectable Secret Sharing Schemes
    Dutta, Sabyasachi
    Safavi-Naini, Reihaneh
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 3 - 23
  • [7] Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes
    Eriguchi, Reo
    Kunihiro, Noboru
    [J]. 2019 IEEE INFORMATION THEORY WORKSHOP (ITW), 2019, : 264 - 268
  • [8] Memory leakage-resilient secret sharing schemes
    DAI ShuGuang
    WEI JinFeng
    ZHANG FangGuo
    [J]. Science China(Information Sciences), 2015, 58 (11) : 191 - 199
  • [9] Memory leakage-resilient secret sharing schemes
    Dai ShuGuang
    Wei JinFeng
    Zhang FangGuo
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (11) : 1 - 9
  • [10] Linear multi-secret sharing schemes
    Liangliang Xiao
    Mulan Liu
    [J]. Science in China Series F: Information Sciences, 2005, 48 : 125 - 136