Algebraic geometric secret sharing schemes over large fields are asymptotically threshold

نویسندگان

چکیده

In Chen-Cramer Crypto 2006 paper \cite{cc} algebraic geometric secret sharing schemes were proposed such that the Fundamental Theorem in Information-Theoretically Secure Multiparty Computation by Ben-Or, Goldwasser and Wigderson \cite{BGW88} Chaum, Crepeau Damgard \cite{CCD88} can be established over constant-size base finite fields. These defined a curve of genus $g$ constant size field ${\bf F}_q$ is quasi-threshold following sense, any subset $u \leq T-1$ players (non qualified) has no information \geq T+2g$ (qualified) reconstruct secret. It natural to ask how far from threshold these are? How many subsets \in [T, T+2g-1]$ recover or have secret? In this it proved almost all [T,T+g-1]$ [T+g,T+2g-1]$ when $q$ goes infinity satisfies $\lim \frac{g}{\sqrt{q}}=0$. Then large fields are asymptotically case. We also analyze case fixed infinity.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields

We introduce algebraic geometric techniques in secret sharing and in secure multi-party computation (MPC) in particular. The main result is a linear secret sharing scheme (LSSS) de ned over a nite eld Fq, with the following properties. 1. It is ideal. The number of players n can be as large as #C(Fq), where C is an algebraic curve C of genus g de ned over Fq. 2. It is quasi-threshold: it is t-r...

متن کامل

Repairable Threshold Secret Sharing Schemes

In this paper, we propose a class of new threshold secret sharing schemes with repairing function between shares. Specifically, each share, when it is broken or lost, can be repaired by some others without the help of the dealer. Further, a construction of such repairable threshold secret sharing schemes is designed by applying linearized polynomials and regenerating codes in distributed storag...

متن کامل

On Asymptotically Good Ramp Secret Sharing Schemes

Asymptotically good sequences of linear ramp secret sharing schemes have been intensively studied by Cramer et al. in terms of sequences of pairs of nested algebraic geometric codes [4, 5, 6, 7, 8, 10]. In those works the focus is on full privacy and full reconstruction. In this paper we analyze additional parameters describing the asymptotic behavior of partial information leakage and possibly...

متن کامل

Threshold changeable secret sharing schemes revisited

This paper studies the methods for changing thresholds in the absence of secure channels after the setup of threshold secret sharing schemes. First, we construct a perfect (t, n) threshold scheme that is threshold changeable to t ′ > t , which is optimal with respect to the share size. This improves the scheme of Wang and Wong by relaxing the requirement from q ≥ n + v to q > n with the secret-...

متن کامل

Verifiable Secret Redistribution for Threshold Sharing Schemes

We present a new protocol for the verifiable redistribution of secrets from (m,n) to (m,n) access structures for threshold sharing schemes. Our protocol enables the addition or removal of shareholders and also guards against mobile adversaries that cause permanent damage. We observe that existing protocols either cannot be readily extended to allow redistribution between different access struct...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Pacific Journal of Mathematics

سال: 2022

ISSN: ['1945-5844', '0030-8730']

DOI: https://doi.org/10.2140/pjm.2022.319.213