Secure Multi-Party Computation from any Linear Secret Sharing Scheme
نویسندگان
چکیده
We present a general treatment of non-cryptographic (i.e. information-theoretically secure) multi-party computation, based on underlying linear secret sharing scheme. This general approach gives pure linear-algebra conditions on the linear mappings describing the scheme. The approach establishing the minimal conditions for security, can lead to design of more efficient Multi-Party Computation (MPC) schemes for general adversary structures. Our first goal is to study the Monotone Span Programs (MSP), which is the result of local multiplication of shares distributed by two given MSPs as well as the access structure that this result MSP computes. Second, we expand the definition for multiplicative MSP from [4] and prove that when we use dual MSPs only all players together can compute the product. The knowledge of the result MSP and the access structure it computes allows us to build an analog of the Genaro et al. algebraic simplification protocol [9]. Using this fact and the homomorphic commitments an efficient general MPC protocol in the computational model for general adversary structures can be build, as described in [9, 4].
منابع مشابه
Computationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملLinear Secret Sharing from Algebraic-Geometric Codes
It is well-known that the linear secret-sharing scheme (LSSS) can be constructed from linear error-correcting codes (Brickell [1], R.J. McEliece and D.V.Sarwate [2],Cramer, el.,[3]). The theory of linear codes from algebraic-geometric curves (algebraic-geometric (AG) codes or geometric Goppa code) has been well-developed since the work of V.Goppa and Tsfasman, Vladut, and Zink( see [17], [18] a...
متن کاملGeneral Secure Multi-party Computation from any Linear Secret-Sharing Scheme
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set of n players can efficiently be based on any linear secret sharing scheme (LSSS) for the players, provided that the access structure of the LSSS allows MPC or VSS at all. Because an LSSS neither guarantees reconstructability when some shares are false, nor verifiability of a shared value, nor allow...
متن کاملShare conversion, pseudorandom secret-sharing and applications to secure distributed computing
We present a method for converting shares of a secret into shares of the same secret in a different secret-sharing scheme using only local computation and no communication between players. In particular, shares in a replicated scheme based on a CNF representation of the access structure can be converted into shares from any linear scheme for the same structure. We show how this can be combined ...
متن کاملAn Improved E-voting scheme using Secret Sharing based Secure Multi-party Computation
E-voting systems (EVS)are having potential advantages over many existing voting schemes. Security, transparency, accuracy and reliability are the major concern in these systems. EVS continues to grow as the technology advances. It is inexpensive and efficient as the resources become reusable. Fast and accurate computation of results with voter privacy is the added advantage. In the proposed sys...
متن کامل