Timed Secret Sharing

被引:0
作者
Kavousi, Alireza [1 ]
Abadi, Aydin [2 ]
Jovanovic, Philipp [1 ]
机构
[1] UCL, London, England
[2] Newcastle Univ, Newcastle Upon Tyne, Tyne & Wear, England
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT VII | 2025年 / 15490卷
关键词
PROTOCOLS;
D O I
10.1007/978-981-96-0941-3_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces the notion of timed secret sharing (TSS), which establishes lower and upper time bounds for secret reconstruction in a threshold secret sharing scheme. Such time bounds are particularly useful in scenarios where an early or late reconstruction of a secret matters. We propose several new constructions that offer different security properties and show how they can be instantiated efficiently using novel techniques. We highlight how our ideas can be used to break the public goods game, which is an issue inherent to threshold secret sharing-based systems, without relying on incentive mechanism. We achieve this through an upper time bound that can be implemented either via short-lived proofs, or the gradual release of additional shares, establishing a trade-off between time and fault tolerance. The latter independently provides robustness in the event of dropout by some portion of shareholders.
引用
收藏
页码:129 / 164
页数:36
相关论文
共 50 条
  • [31] FSS-DBSCAN: Outsourced Private Density-Based Clustering via Function Secret Sharing
    Fu, Jiaxuan
    Cheng, Ke
    Song, Anxiao
    Xia, Yuheng
    Chang, Zhao
    Shen, Yulong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 7759 - 7773
  • [32] DssP: Efficient Dual-Server Secret Sharing Protocol Based on Password Authentication for Cloud Storage Services
    Zhang, Songsong
    Yong, Xie
    Luo, Min
    He, Debiao
    Choo, Kim-Kwang Raymond
    IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 2172 - 2182
  • [33] Outsourced and Privacy-Preserving Collaborative k-Prototype Clustering for Mixed Data via Additive Secret Sharing
    Bi, Renwan
    Guo, Dalong
    Zhang, Yuanyuan
    Huang, Ruihong
    Lin, Li
    Xiong, Jinbo
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (18) : 15810 - 15821
  • [34] SEEMQTT: Secure End-to-End MQTT-Based Communication for Mobile IoT Systems Using Secret Sharing and Trust Delegation
    Hamad, Mohammad
    Finkenzeller, Andreas
    Liu, Hangmao
    Lauinger, Jan
    Prevelakis, Vassilis
    Steinhorst, Sebastian
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (04) : 3384 - 3406
  • [35] (Server-Aided) Two-Party Multiplication of Encrypted Shares Using (k, n) Threshold Secret Sharing With N ≥ k Servers
    Kamal, Ahmad Akmal Aminuddin Mohd
    Iwamura, Keiichi
    IEEE ACCESS, 2021, 9 : 113117 - 113129
  • [36] Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing
    Yu, Kun-Fei
    Gu, Jun
    Hwang, Tzonelih
    Gope, Prosanta
    QUANTUM INFORMATION PROCESSING, 2017, 16 (08)
  • [37] Timed runtime monitoring for multiparty conversations
    Neykova, Rumyana
    Bocchi, Laura
    Yoshida, Nobuko
    FORMAL ASPECTS OF COMPUTING, 2017, 29 (05) : 877 - 910
  • [38] On the Verification of Timed Ad Hoc Networks
    Abdulla, Parosh Aziz
    Delzanno, Giorgio
    Rezine, Othmane
    Sangnier, Arnaud
    Traverso, Riccardo
    FORMAL MODELING AND ANALYSIS OF TIMED SYSTEMS, 2011, 6919 : 256 - +
  • [39] TPAL : A timed-probabilistic model for concurrent processes
    Bueno, A
    Valero, V
    Cuartero, F
    ASIA PACIFIC SOFTWARE ENGINEERING CONFERENCE AND INTERNATIONAL COMPUTER SCIENCE CONFERENCE, PROCEEDINGS, 1997, : 475 - 484
  • [40] Buffer-Assisted Network Updates in Timed SDN
    He, Xin
    Zheng, Jiaqi
    Dai, Haipeng
    Sun, Yuhu
    Dou, Wanchun
    Chen, Guihai
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (10) : 6822 - 6837