Evolving Secret Sharing: Dynamic Thresholds and Robustness

被引:27
作者
Komargodski, Ilan [1 ]
Paskin-Cherniavsky, Anat [2 ]
机构
[1] Cornell Tech, New York, NY 10044 USA
[2] Ariel Univ, Dept Comp Sci, Ariel, Israel
来源
THEORY OF CRYPTOGRAPHY, TCC 2017, PT II | 2017年 / 10678卷
基金
以色列科学基金会;
关键词
D O I
10.1007/978-3-319-70503-3_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threshold secret sharing schemes enable a dealer to share a secret among n parties such that only subsets of parties of cardinality at least k = k(n) can reconstruct the secret. Komargodski, Naor and Yogev (TCC 2016-B) proposed an efficient scheme for sharing a secret among an unbounded number of parties such that only subsets of k parties can recover the secret, where k is any fixed constant. This access structure is known as k-threshold. They left open the possibility of an efficient scheme for the dynamic threshold access structure, in which the qualified sets are of increasing size as the number of parties increases. We resolve this open problem and present a construction in which the share size of the t-th party is O(t(4) center dot log t) bits. Furthermore, we show how to generically translate any scheme for k-threshold into a scheme which is robust, where a shared secret can be recovered even if some parties hand-in incorrect shares. This answers another open problem of Komargodski et al. Our construction is based on the construction of robust (classical) secret sharing schemes of Cramer et al. (EUROCRYPT 2008) using algebraic manipulation detection codes.
引用
收藏
页码:379 / 393
页数:15
相关论文
共 17 条
[1]  
[Anonymous], P AFIPS 1979 NAT COM
[2]  
Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
[3]  
Beimel A., 1996, Secure Schemes for Secret Sharing and Key Distribution
[4]  
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[5]   Essentially Optimal Robust Secret Sharing with Maximal Corruptions [J].
Bishop, Allison ;
Pastro, Valerio ;
Rajaraman, Rajmohan ;
Wichs, Daniel .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I, 2016, 9665 :58-86
[6]  
Cevallos A, 2012, LECT NOTES COMPUT SC, V7237, P195, DOI 10.1007/978-3-642-29011-4_13
[7]  
Cramer R., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P503
[8]  
Cramer R, 2000, LECT NOTES COMPUT SC, V1807, P316
[9]  
Cramer R., 2015, SECURE MULTIPARTY CO
[10]  
Cramer R, 2008, LECT NOTES COMPUT SC, V4965, P471