Strong Security of the Strongly Multiplicative Ramp Secret Sharing Based on Algebraic Curves
نویسنده
چکیده
Secret sharing [1] is a well-established topic in the information security [2]. It attracts renewed interest after Cramer et al. [3] revealed that any linear secret sharing with the so-called multiplicative (or strongly multiplicative) property can be used for the secure multiparty computation. Later, the multiplicative properties were generalized to the ramp secret sharing [4], [5]. In [5, Section 4], the authors also provided two explicit constructions of the strongly multiplicative ramp secret sharing based on algebraic curves, which can be regarded as algebraic geometric generalizations of the McEliece-Sarwate ramp secret sharing [6] based on the Reed-Solomon codes. A set W of shares is said to be forbidden if W has no information about the secret vector s, and said to be qualified if s can be reconstructed from W [7]. W is said to be intermediate if it is neither qualified nor forbidden. The ramp secret sharing allows the existence of intermediate sets, while the perfect secret sharing prohibits the intermediate sets. The merit of ramp secret sharing is that the sizes of shares can be smaller than that of the secret. In ramp secret sharing [8]–[10], an intermediate set may have critical partial information about the secret, as follows: Suppose that the secret is a 17-letter string “username:password”, and an intermediate set W has partial information of 8 letters. The set W may be able to reconstruct “password”, which is very undesirable. In order to prevent such a situation, Yamamoto [7], [9] defined the notion of strong security for the ramp secret sharing, which requires any substring of the secret must not be reconstructed by an intermediate set (a formal definition is given later). An explicit construction with the strong security had remain unknown for many years, but recently Nishiara and Takizawa
منابع مشابه
An Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves
In a (t,n)-threshold secret sharing scheme, a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together, but no group of fewer than t participants can do. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao, and the intractability of the elliptic curve discrete logar...
متن کاملStrongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves
In this work we introduce a novel paradigm for the construction of ramp schemes with strong multiplication that allows the secret to be chosen in an extension field, whereas the shares lie in a base field. When applied to the setting of Shamir’s scheme, for example, this leads to a ramp scheme with strong multiplication from which protocols can be constructed for atomic secure multiplication wi...
متن کاملStrongly Secure Quantum Ramp Secret Sharing Constructed from Algebraic Curves over Finite Fields
The first construction of strongly secure quantum ramp secret sharing by Zhang and Matsumoto had an undesirable feature that the dimension of quantum shares must be larger than the number of shares. By using algebraic curves over finite fields, we propose a new construction in which the number of shares can become arbitrarily large for fixed dimension of shares.
متن کاملCommunication efficient and strongly secure secret sharing schemes based on algebraic geometry codes
Secret sharing schemes with optimal and universal communication overheads have been obtained independently by Bitar et al. and Huang et al. However, their constructions require a finite field of size q > n, where n is the number of shares, and do not provide strong security. In this work, we give a general framework to construct communication efficient secret sharing schemes based on sequences ...
متن کاملStrongly Secure Quantum Ramp Secret Sharing Constructed from Algebraic Curves over Finite Fields (full version arXiv:1410.5126)
Secret sharing (SS) scheme encodes a secret into multiple shares being distributed to participants, so that only qualified sets of shares can reconstruct the secret perfectly [13]. The secret and shares are traditionally classical information [13], but now quantum secret and quantum shares can also be used [3, 4, 11]. In perfect SS, if a set of shares is not qualified, that is, it cannot recons...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2015 شماره
صفحات -
تاریخ انتشار 2015