Theoretical Computer Science ( IF 0.9 ) Pub Date : 2021-07-22 , DOI: 10.1016/j.tcs.2021.07.022 Vipin Singh Sehrawat 1 , Foo Yee Yeo 1 , Yvo Desmedt 2, 3
Secret sharing allows a dealer to distribute a secret among a set of parties such that only authorized subsets, specified by an access structure, can reconstruct the secret. Sehrawat and Desmedt (COCOON 2020 [80]) introduced hidden access structures, that remain secret until some authorized subset of parties collaborate. However, their scheme assumes semi-honest parties and supports only restricted access structures. We address these shortcomings by constructing a novel access structure hiding verifiable secret sharing scheme that supports all monotone access structures. Our scheme is the first secret sharing solution to support malicious behavior identification and share verifiability in malicious-majority settings. Furthermore, the verification procedure of our scheme incurs no communication overhead, and is therefore “free”. As the building blocks of our scheme, we introduce and construct the following:
- •
a set-system with greater than subsets of a set of h elements. Our set-system, , is defined over , where m is a non-prime-power. The size of each set in is divisible by m while the sizes of the pairwise intersections of different sets are not divisible by m unless one set is a (proper) subset of the other,
- •
a new variant of the learning with errors (LWE) problem, called PRIM-LWE, wherein the secret matrix is sampled such that its determinant is a generator of , where q is the LWE modulus.