Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field
نویسندگان
چکیده
This work deals with “MPC-friendly” linear secret sharing schemes (LSSS), a mathematical primitive upon which secure multi-party computation (MPC) can be based and which was introduced by Cramer, Damgaard and Maurer (EUROCRYPT 2000). Chen and Cramer proposed a special class of such schemes that is constructed from algebraic geometry and that enables efficient secure multi-party computation over fixed finite fields (CRYPTO 2006). We extend this in four ways. First, we propose an abstract coding-theoretic framework in which this class of schemes and its (asymptotic) properties can be cast and analyzed. Second, we show that for every finite field Fq, there exists an infinite family of LSSS over Fq that is asymptotically good in the following sense: the schemes are “ideal,” i.e., each share consists of a single Fq-element, and the schemes have t-strong multiplication on n players, where the corruption tolerance 3t n−1 tends to a constant ν(q) with 0 < ν(q) < 1 when n tends to infinity. Moreover, when |Fq| tends to infinity, ν(q) tends to 1, which is optimal. This leads to explicit lower bounds on τ̂(q), our measure of asymptotic optimal corruption tolerance. We achieve this by combining the results of Chen and Cramer with a dedicated field-descent method. In particular, in the F2-case there exists a family of binary t-strongly multiplicative ideal LSSS with 3t n−1 ≈ 2.86% when n tends to infinity, a one-bit secret and just a one-bit share for every player. Previously, such results were shown for Fq with q ≥ 49 a square. Third, we present an infinite family of ideal schemes with t-strong multiplication that does not rely on algebraic geometry and that works over every finite field Fq. Its corruption tolerance vanishes, yet still 3t n−1 = Ω(1/(log log n) logn). Fourth and finally, we give an improved non-asymptotic upper bound on corruption tolerance.
منابع مشابه
Secret Sharing Schemes with a large number of players from Toric Varieties
A general theory for constructing linear secret sharing schemes over a finite field Fq from toric varieties is introduced. The number of players can be as large as (q − 1)r − 1 for r ≥ 1. We present general methods to obtain the reconstruction and privacy thresholds as well as conditions for multiplication on the associated secret sharing schemes. In particular we apply the method on certain to...
متن کاملCommunication efficient and strongly secure secret sharing schemes based on algebraic geometry codes
Secret sharing schemes with optimal and universal communication overheads have been obtained independently by Bitar et al. and Huang et al. However, their constructions require a finite field of size q > n, where n is the number of shares, and do not provide strong security. In this work, we give a general framework to construct communication efficient secret sharing schemes based on sequences ...
متن کاملConvergence theorems of an implicit iteration process for asymptotically pseudocontractive mappings
The purpose of this paper is to study the strong convergence of an implicit iteration process with errors to a common fixed point for a finite family of asymptotically pseudocontractive mappings and nonexpansive mappings in normed linear spaces. The results in this paper improve and extend the corresponding results of Xu and Ori, Zhou and Chang, Sun, Yang and Yu in some aspects.
متن کاملAlgebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields
We introduce algebraic geometric techniques in secret sharing and in secure multi-party computation (MPC) in particular. The main result is a linear secret sharing scheme (LSSS) de ned over a nite eld Fq, with the following properties. 1. It is ideal. The number of players n can be as large as #C(Fq), where C is an algebraic curve C of genus g de ned over Fq. 2. It is quasi-threshold: it is t-r...
متن کاملToric Codes, Multiplicative Structure and Decoding
Long linear codes constructed from toric varieties over finite fields, their multiplicative structure and decoding. The main theme is the inherent multiplicative structure on toric codes. The multiplicative structure allows for decoding, resembling the decoding of Reed-Solomon codes and aligns with decoding by error correcting pairs. We have used the multiplicative structure on toric codes to c...
متن کامل