Fourier-based Function Secret Sharing with General Access Structure

12/03/2017
by   Takeshi Koshiba, et al.
0

Function secret sharing (FSS) scheme is a mechanism that calculates a function f(x) for x in 0,1^n which is shared among p parties, by using distributed functions f_i:0,1^n -> G, where G is an Abelian group, while the function f:0,1^n -> G is kept secret to the parties. Ohsawa et al. in 2017 observed that any function f can be described as a linear combination of the basis functions by regarding the function space as a vector space of dimension 2^n and gave new FSS schemes based on the Fourier basis. All existing FSS schemes are of (p,p)-threshold type. That is, to compute f(x), we have to collect f_i(x) for all the distributed functions. In this paper, as in the secret sharing schemes, we consider FSS schemes with any general access structure. To do this, we observe that Fourier-based FSS schemes by Ohsawa et al. are compatible with linear secret sharing scheme. By incorporating the techniques of linear secret sharing with any general access structure into the Fourier-based FSS schemes, we show Fourier-based FSS schemes with any general access structure.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/28/2018

Exploring Quantum Supremacy in Access Structures of Secret Sharing by Coding Theory

We consider secret sharing schemes with a classical secret and quantum s...
research
10/08/2021

Function-private Conditional Disclosure of Secrets and Multi-evaluation Threshold Distributed Point Functions

Conditional disclosure of secrets (CDS) allows multiple parties to revea...
research
04/13/2021

On Mignotte Secret Sharing Schemes over Gaussian Integers

Secret Sharing Schemes (SSS) are methods for distributing a secret among...
research
07/25/2021

Low-bandwidth recovery of linear functions of Reed-Solomon-encoded data

We study the problem of efficiently computing on encoded data. More spec...
research
02/18/2022

Post-quantum Multi-stage Secret Sharing Schemes using Inhomogeneous Linear Recursion and Ajtai's Function

Secret sharing was firstly proposed in 1979 by Shamir and Blakley respec...
research
05/07/2021

Leakage-Resilient Secret Sharing with Constant Share Size

We consider the leakage resilience of AG code-based ramp secret sharing ...
research
11/30/2020

Extremal Set Theory and LWE Based Access Structure Hiding Verifiable Secret Sharing with Malicious Majority and Free Verification

Secret sharing allows a dealer to distribute a secret among several part...

Please sign up or login with your details

Forgot password? Click here to reset