Short Leakage Resilient and Non-malleable Secret Sharing Schemes

被引:6
作者
Chandran, Nishanth [1 ]
Kanukurthi, Bhavana [2 ]
Obbattu, Sai Lakshmi Bhavana [1 ]
Sekar, Sruthi [3 ]
机构
[1] Microsoft Res, Bengaluru, India
[2] Indian Inst Sci, Dept Comp Sci & Automat, Bengaluru, India
[3] Univ Calif Berkeley, Berkeley, CA 94720 USA
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT I | 2022年 / 13507卷
关键词
EXTRACTORS; RANDOMNESS; CIRCUITS;
D O I
10.1007/978-3-031-15802-5_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Leakage resilient secret sharing (LRSS) allows a dealer to share a secret amongst n parties such that any authorized subset of the parties can recover the secret from their shares, while an adversary that obtains shares of any unauthorized subset of parties along with bounded leakage from the other shares learns no information about the secret. Non-malleable secret sharing (NMSS) provides a guarantee that even shares that are tampered by an adversary will reconstruct to either the original message or something independent of it. The most important parameter of LRSS and NMSS schemes is the size of each share. For LRSS, in the local leakage model (i.e., when the leakage functions on each share are independent of each other and bounded), Srinivasan and Vasudevan (CRYPTO 2019), gave a scheme for threshold access structures with share size of approximately (3.message length +mu), where mu is the number of bits of leakage tolerated from every share. For the case of NMSS, the best known result (again due to the above work) has share size of (11 . message length). In this work, we build LRSS and NMSS schemes with much improved share size. Additionally, our LRSS scheme obtains optimal share and leakage size. In particular, we get the following results: - We build an information-theoretic LRSS scheme for threshold access structures with a share size of (message length + mu). - As an application of the above result, we obtain an NMSS with a share size of (4.message length). Further, for the special case of sharing random messages, we obtain a share size of (2 . message length).
引用
收藏
页码:178 / 207
页数:30
相关论文
共 53 条
  • [1] Aggarwal D., 2022, P S THEORY COMPUTING
  • [2] Stronger Leakage-Resilient and Non-Malleable Secret Sharing Schemes for General Access Structures
    Aggarwal, Divesh
    Damgard, Ivan
    Nielsen, Jesper Buus
    Obremski, Maciej
    Purwanto, Erick
    Ribeiro, Joao
    Simkin, Mark
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 : 510 - 539
  • [3] Aggarwal D, 2015, LECT NOTES COMPUT SC, V9014, P398, DOI 10.1007/978-3-662-46494-6_17
  • [4] Akavik A, 2009, LECT NOTES COMPUT SC, V5444, P474
  • [5] Revisiting Non-Malleable Secret Sharing
    Badrinarayanan, Saikrishna
    Srinivasan, Akshayaram
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT I, 2019, 11476 : 593 - 622
  • [6] Bellare M, 2012, Arxiv, DOI arXiv:1201.3160
  • [7] Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
  • [8] BENALOH J, 1990, LECT NOTES COMPUT SC, V403, P27
  • [9] On the Local Leakage Resilience of Linear Secret Sharing Schemes
    Benhamouda, Fabrice
    Degwekar, Akshay
    Ishai, Yuval
    Rabin, Tal
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 531 - 561
  • [10] Generalized privacy amplification
    Bennett, CH
    Brassard, G
    Crepeau, C
    Maurer, UM
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) : 1915 - 1923