Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/646767.704439guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups

Published: 18 August 2002 Publication History

Abstract

A black-box secret sharing scheme for the threshold access structure T t,n is one which works over any finite Abelian group G . Briefly, such a scheme differs from an ordinary linear secret sharing scheme (over, say, a given finite field) in that distribution matrix and reconstruction vectors are defined over Z and are designed independently of the group G from which the secret and the shares are sampled. This means that perfect completeness and perfect privacy are guaranteed regardless of which group G is chosen. We define the black-box secret sharing problem as the problem of devising, for an arbitrary given T t,n , a scheme with minimal expansion factor, i.e., where the length of the full vector of shares divided by the number of players n is minimal.Such schemes are relevant for instance in the context of distributed cryptosystems based on groups with secret or hard to compute group order. A recent example is secure general multi-party computation over black-box rings.In 1994 Desmedt and Frankel have proposed an elegant approach to the black-box secret sharing problem based in part on polynomial interpolation over cyclotomic number fields. For arbitrary given T t,n with O < t < n - 1, the expansion factor of their scheme is O ( n ). This is the best previous general approach to the problem.Using certain low degree integral extensions of Z over which there exist pairs of sufficiently large Vandermonde matrices with co-prime determinants, we construct, for arbitrary given T t,n with O < t < n - 1, a black-box secret sharing scheme with expansion factor O (log n ), which we show is minimal.

References

[1]
A. Beimel. Secure schemes for secret sharing and key distribution. Ph.D.-thesis, Technion, Haifa, June 1996.
[2]
J. Benaloh and J. Leichter. Generalized secret sharing and monotone functions. In: Proc. CRYPTO '88, Springer LNCS, vol. 765, pp. 274-285, 1988.
[3]
M. Bertilsson, I. Ingemarsson. A construction of practical secret sharing schemes using linear block codes. In Proc. AUSCRYPT '92, Springer LNCS, vol. 718, pp. 67-79, 1993.
[4]
S. Blackburn, M. Burmester, Y. Desmedt, and P. Wild. Efficient multiplicative sharing scheme. In: Proc. EUROCRYPT '96, Springer LNCS, vol. 1070, pp. 107- 118, 1996.
[5]
G. R. Blakley. Safeguarding cryptographic keys. In: Proc. National Computer Conference '79, AFIPS Proceedings, vol. 48, pp. 313-317, 1979.
[6]
E. F. Brickell. Some ideal secret sharing schemes. In: J. Combin. Maths. &amp; Combin. Comp. vol. 9, pp. 105-113, 1989.
[7]
T. Cover and J. Thomas. Elements of information theory. Wiley Series in Telecommunications, 1991.
[8]
R. Cramer, I. Damgaard, and U. Maurer. Efficient general secure multiparty computation from any linear secret-sharing scheme. In: Proc. EUROCRYPT '00, Springer LNCS, vol. 1807, pp. 316-334, 2000.
[9]
R. Cramer, S. Fehr, Y. Ishai, and E. Kushilevitz. Efficient multi-party computation over rings. Manuscript, February 2002.
[10]
Y. Di Crescenzo, and Y. Frankel. Existence of Multiplicative Secret Sharing Schemes with Polynomial Share Expansion. In: Proc. SODA '99, ACM Press, pp. 895-896, 1999.
[11]
Y. Desmedt and Y. Frankel. Theshold cryptosystem. In: Proc. CRYPTO '89, Springer LNCS, vol. 435, pp. 307-315, 1990.
[12]
Y. Desmedt and Y. Frankel. Homomorphic zero-knowledge threshold schemes over any finite Abelian group. In: SIAM Journal on Discrete Mathematics, 7(4), pp. 667-679, 1994.
[13]
Y. Desmedt, A. De Santis, Y. Frankel, and M. Yung. How to share a function securely. In: Proc. STOC '94, ACM Press, pp. 22-33, 1994.
[14]
Y. Desmedt, G. Di Crescenzo, and M. Burmester. Multiplicative non-abelian sharing schemes and their application to threshold cryptography. In: Proc. ASIACRYPT'94, Springer LNCS, vol. 917, pp. 21-31, 1995.
[15]
Y. Desmedt, B. King, W. Kishimoto, and K. Kurosawa. A comment on the efficiency of secret sharing scheme over any finite Abelian group. In: Proc. ACISP '98, Springer LNCS, vol. 1438, pp. 391-402, 1998.
[16]
M. van Dijk. Secret key sharing and secret key generation. Ph. D. Thesis, Eindhoven University of Technology, 1997.
[17]
Y. Frankel, P. Gemmell, P. MacKenzie, and M. Yung. Optimal resilience proactive public-key cryptosystems. In: Proc. FOCS '97, IEEE Press, pp. 384-393, 1997.
[18]
Y. Frankel, P. Gemmell, P. MacKenzie, and M. Yung. Proactive RSA. In: Proc. CRYPTO '97, Springer LNCS, vol. 1294, pp. 440-454, 1997.
[19]
A. Gál. Combinatorial methods in boolean function complexity. Ph.D.-thesis, University of Chicago, 1995.
[20]
M. Karchmer and A. Wigderson. On span programs. In: Proc. Structures in Complexity Theory '93, IEEE Computer Society Press, pp. 102-111, 1993.
[21]
B. King. Some results in linear secret sharing. Ph.D.-thesis, University of Wisconsin-Milwaukee, 2001.
[22]
B. King. Randomness required for linear threshold sharing schemes defined over any finite abelian group. In: Proc. ACISP '01, Springer LNCS, vol. 2119, pp. 376- 391, 2001.
[23]
S. Lang. Algebra. Addison-Wesley Publishing Co., 2nd edition, 1984.
[24]
A. Shamir. How to share a secret. In: Communications of the ACM, (22) pp. 612- 613, 1979.
[25]
V. Shoup. Practical threshold signatures. In: Proc. EUROCRYPT '00, Springer LNCS, vol. 1807, pp. 207-220, 2000.

Cited By

View all
  • (2018)Efficient robust secret sharing from expander graphsCryptography and Communications10.1007/s12095-017-0215-z10:1(79-99)Online publication date: 1-Jan-2018
  • (2018)A novel proactive secret image sharing scheme based on LISSMultimedia Tools and Applications10.1007/s11042-017-5412-477:15(19569-19590)Online publication date: 1-Aug-2018
  • (2016)On the Communication Required for Unconditionally Secure MultiplicationProceedings, Part II, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 981510.1007/978-3-662-53008-5_16(459-488)Online publication date: 14-Aug-2016
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
CRYPTO '02: Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
August 2002
628 pages
ISBN:354044050X

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 18 August 2002

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Efficient robust secret sharing from expander graphsCryptography and Communications10.1007/s12095-017-0215-z10:1(79-99)Online publication date: 1-Jan-2018
  • (2018)A novel proactive secret image sharing scheme based on LISSMultimedia Tools and Applications10.1007/s11042-017-5412-477:15(19569-19590)Online publication date: 1-Aug-2018
  • (2016)On the Communication Required for Unconditionally Secure MultiplicationProceedings, Part II, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 981510.1007/978-3-662-53008-5_16(459-488)Online publication date: 14-Aug-2016
  • (2015)Arithmetic CryptographyProceedings of the 2015 Conference on Innovations in Theoretical Computer Science10.1145/2688073.2688114(143-151)Online publication date: 11-Jan-2015
  • (2015)Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and ApplicationsProceedings of the 18th International Conference on Information Security - Volume 929010.1007/978-3-319-23318-5_30(548-567)Online publication date: 9-Sep-2015
  • (2011)An efficient group-based secret sharing schemeProceedings of the 7th international conference on Information security practice and experience10.5555/2009103.2009131(288-301)Online publication date: 30-May-2011
  • (2008)Span-program-based quantum algorithm for evaluating formulasProceedings of the fortieth annual ACM symposium on Theory of computing10.1145/1374376.1374394(103-112)Online publication date: 17-May-2008
  • (2007)A generalization and a variant of two threshold cryptosystems based on factoringProceedings of the 10th international conference on Information Security10.5555/2396231.2396263(351-361)Online publication date: 9-Oct-2007
  • (2006)Algebraic geometric secret sharing schemes and secure multi-party computations over small fieldsProceedings of the 26th annual international conference on Advances in Cryptology10.1007/11818175_31(521-536)Online publication date: 20-Aug-2006
  • (2006)Linear integer secret sharing and distributed exponentiationProceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography10.1007/11745853_6(75-90)Online publication date: 24-Apr-2006
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media