Extremal Set Theory and LWE Based Access Structure Hiding Verifiable Secret Sharing with Malicious Majority and Free Verification

11/30/2020
by   Vipin Singh Sehrawat, et al.
0

Secret sharing allows a dealer to distribute a secret among several parties such that only authorized subsets of parties, specified by a (monotone) access structure, can reconstruct the secret. Recently, Sehrawat and Desmedt (COCOON 2020) introduced hidden access structures, that remain secret until some authorized subset of parties collaborate. However, that scheme assumes semi-honest parties and only supports restricted access structures. We address these shortcomings by constructing a novel access structure hiding verifiable secret sharing scheme, that supports all monotone access structures. Our scheme is the first verifiable secret sharing scheme that guarantees verifiability even when a majority of the parties are malicious. As the building blocks of our scheme, we introduce and construct: (i) a set-system ℋ with greater than (c2(log h)^2/(loglog h))+2(c(log h)^2/(loglog h)) subsets of a set of h elements. It is defined over ℤ_m, where m is a non-prime-power such that the size of each set in ℋ is divisible by m but the sizes of their pairwise intersections are not, unless one set is a subset of another, (ii) a new variant of the learning with errors (LWE) problem, called PRIM-LWE, wherein the secret matrix can be sampled such that its determinant is a generator of ℤ_q^*, where q is the LWE modulus. Our scheme relies on the hardness of LWE and its maximum share size for ℓ parties is (1+ o(1)) 2^ℓ√(πℓ/2)(2 q^ϱ + 0.5 + √(q) + Θ(h)), where q is the LWE modulus and ϱ≤ 1 is a constant. We also discuss directions for future work to reduce the share size to: ≤13( (1+ o(1)) 2^ℓ√(πℓ/2)(2 q^ϱ + 0.5 + 2√(q)) ).

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/18/2020

Access Structure Hiding Secret Sharing from Novel Set Systems and Vector Families

Secret sharing provides a means to distribute shares of a secret such th...
research
02/09/2020

Communication Efficient Secret Sharing in the Presence of Malicious Adversary

Consider the communication efficient secret sharing problem. A dealer wa...
research
04/29/2023

Computational Quantum Secret Sharing

Quantum secret sharing (QSS) allows a dealer to distribute a secret quan...
research
01/09/2019

Overview of Blakley's Secret Sharing Scheme

In this report, I explained the problem of Secret Sharing Scheme. Then b...
research
12/03/2017

Fourier-based Function Secret Sharing with General Access Structure

Function secret sharing (FSS) scheme is a mechanism that calculates a fu...
research
03/01/2023

Efficient Quantum Secret Sharing Scheme Based On Monotone Span Program

How to efficiently share secrets among multiple participants is a very i...
research
10/16/2018

How to share a cake with a secret agent

In this note we study a problem of fair division in the absence of full ...

Please sign up or login with your details

Forgot password? Click here to reset