License: Creative Commons Attribution 4.0 International license (CC BY 4.0)
When quoting this document, please refer to the following
DOI: 10.4230/LIPIcs.ITC.2021.12
URN: urn:nbn:de:0030-drops-143313
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2021/14331/
Ball, Marshall ;
Çakan, Alper ;
Malkin, Tal
Linear Threshold Secret-Sharing with Binary Reconstruction
Abstract
Motivated in part by applications in lattice-based cryptography, we initiate the study of the size of linear threshold (`t-out-of-n') secret-sharing where the linear reconstruction function is restricted to coefficients in {0,1}. We also study the complexity of such schemes with the additional requirement that the joint distribution of the shares of any unauthorized set of parties is not only independent of the secret, but also uniformly distributed. We prove upper and lower bounds on the share size of such schemes, where the size is measured by the total number of field elements distributed to the parties. We prove our results by defining and investigating an equivalent variant of Karchmer and Wigderson’s Monotone Span Programs [CCC, 1993].
One ramification of our results is that a natural variant of Shamir’s classic scheme [Comm. of ACM, 1979], where bit-decomposition is applied to each share, is optimal for when the underlying field has characteristic 2. Another ramification is that schemes obtained from monotone formulae are optimal for certain threshold values when the field’s characteristic is any constant.
For schemes with the uniform distribution requirement, we show that they must use Ω(nlog n) field elements, for all thresholds 2 < t < n and regardless of the field. Moreover, this is tight up to constant factors for the special cases where any t = n-1 parties can reconstruct, as well as for any threshold when the field characteristic is 2.
BibTeX - Entry
@InProceedings{ball_et_al:LIPIcs.ITC.2021.12,
author = {Ball, Marshall and \c{C}akan, Alper and Malkin, Tal},
title = {{Linear Threshold Secret-Sharing with Binary Reconstruction}},
booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)},
pages = {12:1--12:22},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-197-9},
ISSN = {1868-8969},
year = {2021},
volume = {199},
editor = {Tessaro, Stefano},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/opus/volltexte/2021/14331},
URN = {urn:nbn:de:0030-drops-143313},
doi = {10.4230/LIPIcs.ITC.2021.12},
annote = {Keywords: Secret sharing, Span programs, Lattice-based cryptography}
}
Keywords: |
|
Secret sharing, Span programs, Lattice-based cryptography |
Collection: |
|
2nd Conference on Information-Theoretic Cryptography (ITC 2021) |
Issue Date: |
|
2021 |
Date of publication: |
|
19.07.2021 |