清晨好,您是今天最早来到科研通的研友!由于当前在线用户较少,发布求助请尽量完整的填写文献信息,科研通机器人24小时在线,伴您科研之路漫漫前行!

How to Recover a Secret with O(n) Additions

秘密分享 正确性 计算机科学 可验证秘密共享 同态秘密共享 沙米尔的秘密分享 密码学 理论计算机科学 同态加密 指数 常量(计算机编程) 离散数学 数学 算法 加密 计算机安全 语言学 哲学 集合(抽象数据类型) 程序设计语言
作者
Benny Applebaum,Oded Nir,Benny Pinkas
出处
期刊:Lecture Notes in Computer Science 卷期号:: 236-262 被引量:1
标识
DOI:10.1007/978-3-031-38557-5_8
摘要

Threshold cryptography is typically based on the idea of secret-sharing a private-key $$s\in F$$ "in the exponent" of some cryptographic group G, or more generally, encoding s in some linearly homomorphic domain. In each invocation of the threshold system (e.g., for signing or decrypting) an "encoding" of the secret is being recovered and so the complexity, measured as the number of group multiplications over G, is equal to the number of F-additions that are needed to reconstruct the secret. Motivated by this scenario, we initiate the study of n-party secret-sharing schemes whose reconstruction algorithm makes a minimal number of additions. The complexity of existing schemes either scales linearly with $$n\log |F|$$ (e.g., Shamir, CACM'79) or, at least, quadratically with n independently of the size of the domain F (e.g., Cramer-Xing, EUROCRYPT '20). This leaves open the existence of a secret sharing whose recovery algorithm can be computed by performing only O(n) additions. We resolve the question in the affirmative and present such a near-threshold secret sharing scheme that provides privacy against unauthorized sets of density at most $$\tau _p$$ , and correctness for authorized sets of density at least $$\tau _c$$ , for any given arbitrarily close constants $$\tau _p<\tau _c$$ . Reconstruction can be computed by making at most O(n) additions and, in addition, (1) the share size is constant, (2) the sharing procedure also makes only O(n) additions, and (3) the scheme is a blackbox secret-sharing scheme, i.e., the sharing and reconstruction algorithms work universally for all finite abelian groups F. Prior to our work, no such scheme was known even without features (1)–(3) and even for the ramp setting where $$\tau _p$$ and $$\tau _c$$ are far apart. As a by-product, we derive the first blackbox near-threshold secret-sharing scheme with linear-time sharing. We also present several concrete instantiations of our approach that seem practically efficient (e.g., for threshold discrete-log-based signatures). Our constructions are combinatorial in nature. We combine graph-based erasure codes that support "peeling-based" decoding with a new randomness extraction method that is based on inner-product with a small-integer vector. We also introduce a general concatenation-like transform for secret-sharing schemes that allows us to arbitrarily shrink the privacy-correctness gap with a minor overhead. Our techniques enrich the secret-sharing toolbox and, in the context of blackbox secret sharing, provide a new alternative to existing number-theoretic approaches.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
大模型应助科研通管家采纳,获得10
19秒前
19秒前
30秒前
46秒前
Arthur完成签到 ,获得积分10
49秒前
ZXT完成签到 ,获得积分10
52秒前
zhuosht完成签到 ,获得积分10
58秒前
蝎子莱莱xth完成签到,获得积分10
1分钟前
氢锂钠钾铷铯钫完成签到,获得积分10
1分钟前
mymEN完成签到 ,获得积分10
1分钟前
Square完成签到,获得积分10
1分钟前
蓝意完成签到,获得积分0
1分钟前
chichenglin完成签到 ,获得积分10
1分钟前
A,w携念e行ོ完成签到,获得积分10
1分钟前
丹妮完成签到 ,获得积分10
1分钟前
1分钟前
凉面完成签到 ,获得积分10
1分钟前
yzhilson完成签到 ,获得积分10
1分钟前
刘丰完成签到 ,获得积分10
1分钟前
孟寐以求完成签到 ,获得积分10
1分钟前
蒲蒲完成签到 ,获得积分10
2分钟前
淡然藏花完成签到 ,获得积分10
2分钟前
情怀应助科研通管家采纳,获得10
2分钟前
2分钟前
1111chen完成签到 ,获得积分10
2分钟前
MYZ完成签到,获得积分10
2分钟前
大大完成签到 ,获得积分10
2分钟前
西西完成签到,获得积分10
2分钟前
YuLu完成签到 ,获得积分10
3分钟前
3分钟前
strama完成签到,获得积分10
3分钟前
zqlxueli完成签到 ,获得积分10
4分钟前
高高的巨人完成签到 ,获得积分10
4分钟前
heija完成签到,获得积分10
4分钟前
李健应助科研通管家采纳,获得10
4分钟前
科研通AI2S应助科研通管家采纳,获得10
4分钟前
自然的含蕾完成签到 ,获得积分10
4分钟前
zijingsy完成签到 ,获得积分10
4分钟前
美丽的楼房完成签到 ,获得积分10
4分钟前
楚襄谷完成签到 ,获得积分10
4分钟前
高分求助中
Applied Survey Data Analysis (第三版, 2025) 800
Assessing and Diagnosing Young Children with Neurodevelopmental Disorders (2nd Edition) 700
Images that translate 500
引进保护装置的分析评价八七年国外进口线路等保护运行情况介绍 500
Algorithmic Mathematics in Machine Learning 500
Handbook of Innovations in Political Psychology 400
Mapping the Stars: Celebrity, Metonymy, and the Networked Politics of Identity 400
热门求助领域 (近24小时)
化学 材料科学 医学 生物 工程类 有机化学 物理 生物化学 纳米技术 计算机科学 化学工程 内科学 复合材料 物理化学 电极 遗传学 量子力学 基因 冶金 催化作用
热门帖子
关注 科研通微信公众号,转发送积分 3840857
求助须知:如何正确求助?哪些是违规求助? 3382763
关于积分的说明 10526469
捐赠科研通 3102618
什么是DOI,文献DOI怎么找? 1708918
邀请新用户注册赠送积分活动 822781
科研通“疑难数据库(出版商)”最低求助积分说明 773622