Communication Efficient Secret Sharing in the Presence of Malicious Adversary

02/09/2020
by   Rawad Bitar, et al.
0

Consider the communication efficient secret sharing problem. A dealer wants to share a secret with n parties such that any k≤ n parties can reconstruct the secret and any z<k parties eavesdropping on their shares obtain no information about the secret. In addition, a legitimate user contacting any d, k≤ d ≤ n, parties to decode the secret can do so by reading and downloading the minimum amount of information needed. We are interested in communication efficient secret sharing schemes that tolerate the presence of malicious parties actively corrupting their shares and the data delivered to the users. The knowledge of the malicious parties about the secret is restricted to the shares they obtain. We characterize the capacity, i.e. maximum size of the secret that can be shared. We derive the minimum amount of information needed to to be read and communicated to a legitimate user to decode the secret from d parties, k≤ d ≤ n. Error-correcting codes do not achieve capacity in this setting. We construct codes that achieve capacity and achieve minimum read and communication costs for all possible values of d. Our codes are based on Staircase codes, previously introduced for communication efficient secret sharing, and on the use of a pairwise hashing scheme used in distributed data storage and network coding settings to detect errors inserted by a limited knowledge adversary.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/30/2020

Extremal Set Theory and LWE Based Access Structure Hiding Verifiable Secret Sharing with Malicious Majority and Free Verification

Secret sharing allows a dealer to distribute a secret among several part...
research
01/29/2021

Theory of Communication Efficient Quantum Secret Sharing

A ((k,n)) quantum threshold secret sharing (QTS) scheme is a quantum cry...
research
01/13/2018

Distributed Multi-User Secret Sharing

A distributed secret sharing system is considered that consists of a dea...
research
08/30/2019

Pacer: Network Side-Channel Mitigation in the Cloud

An important concern for many Cloud customers is data confidentiality. O...
research
02/21/2020

Quantum secret sharing using GHZ state qubit positioning and selective qubits strategy for secret reconstruction

The work presents a novel quantum secret sharing strategy based on GHZ p...
research
02/13/2020

Conditional Disclosure of Secrets: A Noise and Signal Alignment Approach

In the conditional disclosure of secrets (CDS) problem, Alice and Bob (e...
research
06/08/2021

On the Linear Capacity of Conditional Disclosure of Secrets

Conditional disclosure of secrets (CDS) is the problem of disclosing as ...

Please sign up or login with your details

Forgot password? Click here to reset