Algebraic geometric secret sharing schemes over large fields are asymptotically threshold
نویسندگان
چکیده
In Chen-Cramer Crypto 2006 paper \cite{cc} algebraic geometric secret sharing schemes were proposed such that the Fundamental Theorem in Information-Theoretically Secure Multiparty Computation by Ben-Or, Goldwasser and Wigderson \cite{BGW88} Chaum, Crepeau Damgard \cite{CCD88} can be established over constant-size base finite fields. These defined a curve of genus $g$ constant size field ${\bf F}_q$ is quasi-threshold following sense, any subset $u \leq T-1$ players (non qualified) has no information \geq T+2g$ (qualified) reconstruct secret. It natural to ask how far from threshold these are? How many subsets \in [T, T+2g-1]$ recover or have secret? In this it proved almost all [T,T+g-1]$ [T+g,T+2g-1]$ when $q$ goes infinity satisfies $\lim \frac{g}{\sqrt{q}}=0$. Then large fields are asymptotically case. We also analyze case fixed infinity.
منابع مشابه
Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields
We introduce algebraic geometric techniques in secret sharing and in secure multi-party computation (MPC) in particular. The main result is a linear secret sharing scheme (LSSS) de ned over a nite eld Fq, with the following properties. 1. It is ideal. The number of players n can be as large as #C(Fq), where C is an algebraic curve C of genus g de ned over Fq. 2. It is quasi-threshold: it is t-r...
متن کاملRepairable Threshold Secret Sharing Schemes
In this paper, we propose a class of new threshold secret sharing schemes with repairing function between shares. Specifically, each share, when it is broken or lost, can be repaired by some others without the help of the dealer. Further, a construction of such repairable threshold secret sharing schemes is designed by applying linearized polynomials and regenerating codes in distributed storag...
متن کاملOn Asymptotically Good Ramp Secret Sharing Schemes
Asymptotically good sequences of linear ramp secret sharing schemes have been intensively studied by Cramer et al. in terms of sequences of pairs of nested algebraic geometric codes [4, 5, 6, 7, 8, 10]. In those works the focus is on full privacy and full reconstruction. In this paper we analyze additional parameters describing the asymptotic behavior of partial information leakage and possibly...
متن کاملThreshold changeable secret sharing schemes revisited
This paper studies the methods for changing thresholds in the absence of secure channels after the setup of threshold secret sharing schemes. First, we construct a perfect (t, n) threshold scheme that is threshold changeable to t ′ > t , which is optimal with respect to the share size. This improves the scheme of Wang and Wong by relaxing the requirement from q ≥ n + v to q > n with the secret-...
متن کاملVerifiable Secret Redistribution for Threshold Sharing Schemes
We present a new protocol for the verifiable redistribution of secrets from (m,n) to (m,n) access structures for threshold sharing schemes. Our protocol enables the addition or removal of shareholders and also guards against mobile adversaries that cause permanent damage. We observe that existing protocols either cannot be readily extended to allow redistribution between different access struct...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Pacific Journal of Mathematics
سال: 2022
ISSN: ['1945-5844', '0030-8730']
DOI: https://doi.org/10.2140/pjm.2022.319.213