Constructing Leakage-Resilient Shamir's Secret Sharing: Over Composite Order Fields

被引:2
|
作者
Maji, Hemanta K. [1 ]
Nguyen, Hai H. [2 ]
Paskin-Cherniaysky, Anat [3 ]
Ye, Xiuyu [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
[3] Ariel Univ, Dept Comp Sci, Ariel, Israel
来源
ADVANCES IN CRYPTOLOGY, PT IV, EUROCRYPT 2024 | 2024年 / 14654卷
关键词
DISTRIBUTED STORAGE; REGENERATING CODES; REPAIR;
D O I
10.1007/978-3-031-58737-5_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Probing physical bits in hardware has compromised cryptographic systems. This work investigates how to instantiate Shamir's secret sharing so that the physical probes into its shares reveal statistically insignificant information about the secret. Over prime fields, Maji, Nguyen, Paskin-Cherniavsky, Suad, and Wang (EUROCRYPT 2021) proved that choosing random evaluation places achieves this objective with high probability. Our work extends their randomized construction to composite order fields - particularly for fields with characteristic 2. Next, this work presents an algorithm to classify evaluation places as secure or vulnerable against physical-bit probes for some specific cases. Our security analysis of the randomized construction is Fourier-analytic, and the classification techniques are combinatorial. Our analysis relies on (1) contemporary B ' ezout-theorem-type algebraic complexity results that bound the number of simultaneous zeroes of a system of polynomial equations over composite order fields and (2) characterization of the zeroes of an appropriate generalized Vandermonde determinant.
引用
收藏
页码:286 / 315
页数:30
相关论文
共 50 条
  • [1] Towards Breaking the Half-Barrier of Local Leakage-Resilient Shamir's Secret Sharing
    Nguyen, Hai H.
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT V, 2024, 14924 : 257 - 285
  • [2] Constructing Locally Leakage-Resilient Linear Secret-Sharing Schemes
    Maji, Hemanta K.
    Paskin-Cherniavsky, Anat
    Suad, Tom
    Wang, Mingyuan
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 779 - 808
  • [3] Lower Bounds for Leakage-Resilient Secret Sharing
    Nielsen, Jesper Buus
    Simkin, Mark
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 556 - 577
  • [4] Memory leakage-resilient secret sharing schemes
    DAI ShuGuang
    WEI JinFeng
    ZHANG FangGuo
    ScienceChina(InformationSciences), 2015, 58 (11) : 191 - 199
  • [5] Memory leakage-resilient secret sharing schemes
    Dai ShuGuang
    Wei JinFeng
    Zhang FangGuo
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (11) : 1 - 9
  • [6] Leakage-Resilient Secret Sharing Against Colluding Parties
    Kumar, Ashutosh
    Meka, Raghu
    Sahai, Amit
    2019 IEEE 60TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2019), 2019, : 636 - 660
  • [7] Stronger Lower Bounds for Leakage-Resilient Secret Sharing
    Hoffmann, Charlotte
    Simkin, Mark
    PROGRESS IN CRYPTOLOGY, LATINCRYPT 2023, 2023, 14168 : 215 - 228
  • [8] Leakage-Resilient Secret Sharing With Constant Share Size
    Tjuawinata, Ivan
    Xing, Chaoping
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (12) : 8228 - 8250
  • [9] Leakage-resilient verifiable multi-secret sharing scheme
    Shen H.
    Chen M.-W.
    Zhang M.-W.
    Beijing Youdian Daxue Xuebao, 1 (87-91): : 87 - 91
  • [10] ZK-PCPs from Leakage-Resilient Secret Sharing
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    Weiss, Mor
    JOURNAL OF CRYPTOLOGY, 2022, 35 (04)