Timed Secret Sharing

被引:0
作者
Kavousi, Alireza [1 ]
Abadi, Aydin [2 ]
Jovanovic, Philipp [1 ]
机构
[1] UCL, London, England
[2] Newcastle Univ, Newcastle Upon Tyne, Tyne & Wear, England
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT VII | 2025年 / 15490卷
关键词
PROTOCOLS;
D O I
10.1007/978-981-96-0941-3_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces the notion of timed secret sharing (TSS), which establishes lower and upper time bounds for secret reconstruction in a threshold secret sharing scheme. Such time bounds are particularly useful in scenarios where an early or late reconstruction of a secret matters. We propose several new constructions that offer different security properties and show how they can be instantiated efficiently using novel techniques. We highlight how our ideas can be used to break the public goods game, which is an issue inherent to threshold secret sharing-based systems, without relying on incentive mechanism. We achieve this through an upper time bound that can be implemented either via short-lived proofs, or the gradual release of additional shares, establishing a trade-off between time and fault tolerance. The latter independently provides robustness in the event of dropout by some portion of shareholders.
引用
收藏
页码:129 / 164
页数:36
相关论文
共 50 条
  • [21] Unconditional security of entanglement-based continuous-variable quantum secret sharing
    Kogias, Ioannis
    Xiang, Yu
    He, Qiongyi
    Adesso, Gerardo
    PHYSICAL REVIEW A, 2017, 95 (01)
  • [22] Privacy Preserving Multi-Party Computation With Secret Sharing for Trajectory Prediction in VANETs
    Liu, Dengzhi
    Yu, Geng
    Ding, Yongdong
    Zhong, Zhaoman
    Wang, Chen
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (12) : 18666 - 18677
  • [23] Achieving Secure and Reliable UAV Authentication: A Shamir's Secret Sharing Based Approach
    Bansal, Gaurang
    Sikdar, Biplab
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (04): : 3598 - 3610
  • [24] Efficient dynamic quantum secret sharing in pre-measurement and post-measurement phases
    Lin, Jason
    Chen, Chang -Chi
    Huang, Chung-Yung
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2024, 638
  • [25] Dual-Cloud Multi-Secret Sharing Architecture for Privacy Preserving Persistent Computation
    Chen, Yu-Chi
    Yang, Jhe-Kai
    Yen, Hsin-Chan
    Lin, Pei-Wen
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 7523 - 7535
  • [26] Authenticated Distributed Group Key Agreement Protocol Using Elliptic Curve Secret Sharing Scheme
    Subrahmanyam, Rolla
    Rekha, N. Rukma
    Rao, Y. V. Subba
    IEEE ACCESS, 2023, 11 : 45243 - 45254
  • [27] Novel Strong-PUF-Based Authentication Protocols Leveraging Shamir's Secret Sharing
    Chen, Shuai
    Li, Bing
    Chen, Ziheng
    Zhang, Yan
    Wang, Caicai
    Tao, Cheng
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16) : 14408 - 14425
  • [28] Communication-Efficient Privacy-Preserving Neural Network Inference via Arithmetic Secret Sharing
    Bi, Renwan
    Xiong, Jinbo
    Luo, Changqing
    Ning, Jianting
    Liu, Ximeng
    Tian, Youliang
    Zhang, Yan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 6722 - 6737
  • [29] Universal Adaptive Construction of Verifiable Secret Sharing and Its Application to Verifiable Secure Distributed Data Storage
    Hayashi, Masahito
    Koshiba, Takeshi
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, 32 (01) : 253 - 267
  • [30] Equivalence of Non-Perfect Secret Sharing and Symmetric Private Information Retrieval With General Access Structure
    Song, Seunghoan
    Hayashi, Masahito
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2022, 40 (03) : 999 - 1012