Leakage-Resilient Secret Sharing with Constant Share Size

05/07/2021
by   Ivan Tjuawinata, et al.
0

We consider the leakage resilience of AG code-based ramp secret sharing schemes extending the leakage resilience of linear threshold secret sharing schemes over prime fields done by Benhamouda et al. Since there is not any explicit efficient construction of AG codes over prime fields, we consider constructions over prime fields with the help of concatenation method and those over field extensions. Extending the Fourier analysis done by Benhamouda et al., concatenated algebraic geometric codes over prime fields do produce some nice leakage-resilient secret sharing schemes. One natural and curious question is whether AG codes over extension fields produce better leakage-resilient secret sharing schemes than the construction based on concatenated AG codes. Such construction provides several advantages compared to the construction over prime fields using concatenation method. First, AG codes over extension fields give secret sharing schemes with smaller reconstruction for a fixed privacy parameter t. Second, concatenated AG codes do not enjoy strong multiplicity and hence they are not applicable to secure MPC schemes. It is also confirmed that indeed AG codes over extension fields have stronger leakage-resilience under some reasonable assumptions. These three advantages strongly motivate the study of secret sharing schemes from AG codes over extension fields. The current paper has two main contributions: 1, we obtain leakage-resilient secret sharing schemes with constant share sizes and unbounded numbers of players. Like Shamir secret scheme, our schemes enjoy multiplicity and hence can be applied to MPC. 2, via a sophisticated Fourier Analysis, we analyze the leakage-resilience of secret sharing schemes from codes over extension fields. This is of its own theoretical interest independent of its application to secret sharing schemes from algebraic geometric codes over extension fields.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/30/2021

Secret sharing schemes from hypersurfaces over finite fields

Linear error-correcting codes can be used for constructing secret sharin...
research
01/05/2021

Algebraic Geometric Secret Sharing Schemes over Large Fields Are Asymptotically Threshold

In Chen-Cramer Crypto 2006 paper <cit.> algebraic geometric secret shari...
research
08/20/2018

Toric Varieties and Codes, Error-correcting Codes, Quantum Codes, Secret Sharing and Decoding

We present toric varieties and associated toric codes and their decoding...
research
02/10/2022

Faulty isogenies: a new kind of leakage

In SIDH and SIKE protocols, public keys are defined over quadratic exten...
research
12/03/2017

Fourier-based Function Secret Sharing with General Access Structure

Function secret sharing (FSS) scheme is a mechanism that calculates a fu...
research
10/12/2019

On the equivalence of authentication codes and robust (2,2)-threshold schemes

In this paper, we show a "direct" equivalence between certain authentica...
research
05/16/2021

Low-Complexity PIR Using Subfield Subcodes

A major drawback of many PIR schemes is the highcomputational cost at th...

Please sign up or login with your details

Forgot password? Click here to reset