On multiplicative linear secret sharing schemes

被引:0
|
作者
Nikov, V
Nikova, S
Preneel, B
机构
[1] Eindhoven Univ Technol, Dept Math & Comp Sci, NL-5600 MB Eindhoven, Netherlands
[2] Katholieke Univ Leuven, Dept Elect Engn, ESAT COSIC, B-3001 Heverlee, Belgium
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the Monotone Span Program (MSP), that is the result of local multiplication of shares distributed by two given MSPs as well as the access structure that this resulting MSP computes. First, we expand the construction proposed by Cramer et al. for multiplying two different general access structures and we prove some properties of the resulting MSP. We prove that using two (different) MSPs to compute their resulting MSP is more efficient than building a multiplicative MSP. Next we define a (strongly) multiplicative resulting MSP and we prove that when one uses dual MSPs only all players together can compute the product. An analog of the algebraic simplification protocol of Gennaro et al. is presented. We show which conditions the resulting access structure should fulfill in order to achieve MPC secure, against an adaptive, active adversary in the zero-error case in both the computational and the information-theoretic model.
引用
收藏
页码:135 / 147
页数:13
相关论文
共 50 条
  • [1] Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes
    Zhang, Zhifang
    Liu, Mulan
    Chee, Yeow Meng
    Ling, San
    Wang, Huaxiong
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 19 - +
  • [2] Multiplicative linear secret sharing schemes based on connectivity of graphs
    Liu, Mulan
    Xiao, Liangliang
    Zhang, Zhifang
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2007, 53 (11) : 3973 - 3978
  • [3] A Linear Construction of Secret Sharing Schemes
    Marten van Dijk
    Designs, Codes and Cryptography, 1997, 12 (2) : 161 - 201
  • [4] Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes
    Eriguchi, Reo
    Kunihiro, Noboru
    2019 IEEE INFORMATION THEORY WORKSHOP (ITW), 2019, : 264 - 268
  • [5] Linear multi-secret sharing schemes
    Liangliang Xiao
    Mulan Liu
    Science in China Series F: Information Sciences, 2005, 48 : 125 - 136
  • [6] Linear multi-secret sharing schemes
    Xiao, LL
    Liu, ML
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2005, 48 (01): : 125 - 136
  • [7] Linear multi-secret sharing schemes
    XIAO Liangliang & LIU Mulan Academy of Mathematics and System Sciences and Key Laboratory of Mathematics Mechanization
    Science in China(Series F:Information Sciences), 2005, (01) : 125 - 136
  • [8] Operations over Linear Secret Sharing Schemes
    Slinko, Arkadii
    DECISION AND GAME THEORY FOR SECURITY, 2019, 11836 : 513 - 524
  • [9] Linear secret sharing schemes and rearrangements of access structures
    Xiao L.-L.
    Liu M.-L.
    Acta Mathematicae Applicatae Sinica, 2004, 20 (4) : 685 - 694
  • [10] Multi-linear Secret-Sharing Schemes
    Beimel, Amos
    Ben-Efraim, Aner
    Padro, Carles
    Tyomkin, Ilya
    THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 394 - 418