The Share Size of Secret-Sharing Schemes for Almost All Access Structures and Graphs

被引:10
作者
Beimel, Amos [1 ]
Farras, Oriol [2 ]
机构
[1] Ben Gurion Univ Negev, Beer Sheva, Israel
[2] Univ Rovira & Virgili, Tarragona, Catalonia, Spain
来源
THEORY OF CRYPTOGRAPHY, TCC 2020, PT III | 2020年 / 12552卷
基金
欧洲研究理事会;
关键词
INFORMATION RATE; LOWER BOUNDS; COMPLEXITY;
D O I
10.1007/978-3-030-64381-2_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The share size of general secret-sharing schemes is poorly understood. The gap between the best known upper bound on the total share size per party of 2(0.64n) (Applebaum et al., STOC 2020) and the best known lower bound of Omega(n/ log n) (Csirmaz, J. of Cryptology 1997) is huge (where n is the number of parties in the scheme). To gain some understanding on this problem, we study the share size of secret-sharing schemes of almost all access structures, i.e., of almost all collections of authorized sets. This is motivated by the fact that in complexity, many times almost all objects are hardest (e.g., most Boolean functions require exponential size circuits). All previous constructions of secret-sharing schemes were for the worst access structures (i.e., all access structures) or for specific families of access structures. We prove upper bounds on the share size for almost all access structures. We combine results on almost all monotone Boolean functions (Korshunov, Probl. Kibern. 1981) and a construction of (Liu and Vaikuntanathan, STOC 2018) and conclude that almost all access structures have a secret-sharing scheme with share size 2((O) over tilde (root n)). We also study graph secret-sharing schemes. In these schemes, the parties are vertices of a graph and a set can reconstruct the secret if and only if it contains an edge. Again, for this family there is a huge gap between the upper bounds - O(n/log n) (Erdos and Pyber, Discrete Mathematics 1997) - and the lower bounds - Omega(log n) (van Dijk, Des. Codes Crypto. 1995). We show that for almost all graphs, the share size of each party is n(o(1)). This result is achieved by using robust 2-server conditional disclosure of secrets protocols, a new primitive introduced and constructed in (Applebaum et al., STOC 2020), and the fact that the size of the maximal independent set in a random graph is small. Finally, using robust conditional disclosure of secrets protocols, we improve the total share size for all very dense graphs.
引用
收藏
页码:499 / 529
页数:31
相关论文
共 60 条
  • [1] Aiello B, 2001, LECT NOTES COMPUT SC, V2045, P119
  • [2] Applebaum B., 2019, 10 ITCS
  • [3] Better Secret Sharing via Robust Conditional Disclosure of Secrets
    Applebaum, Benny
    Beimel, Amos
    Nir, Oded
    Peter, Naty
    [J]. PROCEEDINGS OF THE 52ND ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING (STOC '20), 2020, : 280 - 293
  • [4] Secret-Sharing Schemes for General and Uniform Access Structures
    Applebaum, Benny
    Beimel, Amos
    Farras, Oriol
    Nir, Oded
    Peter, Naty
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT III, 2019, 11478 : 441 - 471
  • [5] On the Power of Amortization in Secret Sharing: d-Uniform Secret Sharing and CDS with Constant Information Rate
    Applebaum, Benny
    Arkis, Barak
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2018, PT I, 2018, 11239 : 317 - 344
  • [6] The Communication Complexity of Private Simultaneous Messages, Revisited
    Applebaum, Benny
    Holenstein, Thomas
    Mishra, Manoj
    Shayevitz, Ofer
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 : 261 - 286
  • [7] Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-Bounds, and Separations
    Applebaum, Benny
    Arkis, Barak
    Raykov, Pavel
    Vasudevan, Prashant Nalini
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 : 727 - 757
  • [8] Attrapadung N, 2014, LECT NOTES COMPUT SC, V8441, P557, DOI 10.1007/978-3-642-55220-5_31
  • [9] Superpolynomial lower bounds for monotone span programs
    Babai, L
    Gál, A
    Wigderson, A
    [J]. COMBINATORICA, 1999, 19 (03) : 301 - 319
  • [10] Beimel Amos, 2018, Advances in Cryptology - ASIACRYPT 2018. 24th International Conference on the Theory and Application of Cryptology and Information Security. Proceedings: Lecture Notes in Computer Science (LNCS 11274), P332, DOI 10.1007/978-3-030-03332-3_13