当前位置: X-MOL 学术Theor. Comput. Sci. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
Theoretical Computer Science ( IF 1.1 ) Pub Date : 2021-07-22 , DOI: 10.1016/j.tcs.2021.07.022
Vipin Singh Sehrawat 1 , Foo Yee Yeo 1 , Yvo Desmedt 2, 3
Affiliation  

Secret sharing allows a dealer to distribute a secret among a set of parties such that only authorized subsets, specified by an access structure, can reconstruct the secret. Sehrawat and Desmedt (COCOON 2020 [80]) introduced hidden access structures, that remain secret until some authorized subset of parties collaborate. However, their scheme assumes semi-honest parties and supports only restricted access structures. We address these shortcomings by constructing a novel access structure hiding verifiable secret sharing scheme that supports all monotone access structures. Our scheme is the first secret sharing solution to support malicious behavior identification and share verifiability in malicious-majority settings. Furthermore, the verification procedure of our scheme incurs no communication overhead, and is therefore “free”. As the building blocks of our scheme, we introduce and construct the following:

a set-system with greater than exp(c2(logh)2(loglogh))+2exp(c(logh)2(loglogh)) subsets of a set of h elements. Our set-system, H, is defined over Zm, where m is a non-prime-power. The size of each set in H is divisible by m while the sizes of the pairwise intersections of different sets are not divisible by m unless one set is a (proper) subset of the other,

a new variant of the learning with errors (LWE) problem, called PRIM-LWE, wherein the secret matrix is sampled such that its determinant is a generator of Zq, where q is the LWE modulus.

Our scheme arranges parties as nodes of a directed acyclic graph and employs modulus switching during share generation and secret reconstruction. For a setting with parties, our (non-linear) scheme supports all 22O(log) monotone access structures, and its security relies on the hardness of the LWE problem. Our scheme's maximum share size, for any access structure, is:(1+o(1))2π/2(2qϱ+0.5+q+Θ(h)), where ϱ1 is a constant. We provide directions for future work to reduce the maximum share size to:1l+1((1+o(1))2π/2(2qϱ+0.5+2q)), where l2. We also discuss three applications of our secret sharing scheme.

更新日期:2021-09-07
down
wechat
bug