Evolving Ramp Secret Sharing with a Small Gap

被引:11
作者
Beimel, Amos [1 ]
Othman, Hussien [1 ]
机构
[1] Ben Gurion Univ Negev, Dept Comp Sci, Beer Sheva, Israel
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I | 2020年 / 12105卷
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-030-45721-1_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Evolving secret-sharing schemes, introduced by Komargodski, Naor, and Yogev (TCC 2016b), are secret-sharing schemes in which there is no a-priory upper bound on the number of parties that will participate. The parties arrive one by one and when a party arrives the dealer gives it a share; the dealer cannot update this share when other parties arrive. Motivated by the fact that when the number of parties is known, ramp secret-sharing schemes are more efficient than threshold secret-sharing schemes, we study evolving ramp secret-sharing schemes. Specifically, we study evolving (b(j), g(j))-ramp secret-sharing schemes, where g, b : N ->. N are non-decreasing functions. In such schemes, any set of parties that for some j contains g(j) parties from the first parties that arrive can reconstruct the secret, and any set such that for every j contains less than b(j) parties from the first j parties that arrive cannot learn any information about the secret. We focus on the case that the gap is small, namely g(j)- b(j) = j beta for 0 < beta < 1. We show that there is an evolving ramp secret-sharing scheme with gap t(beta), in which the share size of the j-th party is (O) over tilde (j(4-1/log2 1/beta)). Furthermore, we show that our construction results in much better share size for fixed values of beta, i.e., there is an evolving ramp secret-sharing scheme with gap root j, in which the share size of the j-th party is (O) over tilde (j). Our construction should be compared to the best known evolving g(j)-threshold secret-sharing schemes (i.e., when b(j) = g(j) - 1) in which the share size of the j-th party is (O) over tilde (j(4)). Thus, our construction offers a significant improvement for every constant beta, showing that allowing a gap between the sizes of the authorized and unauthorized sets can reduce the share size. In addition, we present an evolving (k/2, k)-ramp secret-sharing scheme for a constant k (which can be very big), where any set of parties of size at least k can reconstruct the secret and any set of parties of size at most k/2 cannot learn any information about the secret. The share size of the j-th party in our construction is O(log k log j). This is an improvement over the best known evolving k-threshold secret-sharing schemes in which the share size of the j-th party is O(k log j).
引用
收藏
页码:529 / 555
页数:27
相关论文
共 18 条
[1]   Evolving Ramp Secret-Sharing Schemes [J].
Beimel, Amos ;
Othman, Hussien .
SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 :313-332
[2]  
Benaloh J., 1989, COMMUNICATION
[3]  
Blakley G.R., 1979, P 1979 AFIPS NAT COM, P313
[4]  
Blakley GR, 1984, LECT NOTES COMPUTER, P242, DOI DOI 10.1007/3-540-39568-7_20
[5]   Threshold Secret Sharing Requires a Linear Size Alphabet [J].
Bogdanov, Andrej ;
Guo, Siyao ;
Komargodski, Ilan .
THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 :471-484
[6]  
Cachin C, 1995, LECT NOTES COMPUT SC, V1025, P190
[7]   Bounds on the Threshold Gap in Secret Sharing and its Applications [J].
Cascudo, Ignacio ;
Cramer, Ronald ;
Xing, Chaoping .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (09) :5600-5612
[8]  
Chen H, 2007, LECT NOTES COMPUT SC, V4515, P291
[9]   On-line secret sharing [J].
Csirmaz, Laszlo ;
Tardos, Gabor .
DESIGNS CODES AND CRYPTOGRAPHY, 2012, 63 (01) :127-147
[10]  
D'Arco P., 2018, 43 INT S MATH FDN CO, V117