On multiplicative linear secret sharing schemes

被引:0
|
作者
Nikov, V
Nikova, S
Preneel, B
机构
[1] Eindhoven Univ Technol, Dept Math & Comp Sci, NL-5600 MB Eindhoven, Netherlands
[2] Katholieke Univ Leuven, Dept Elect Engn, ESAT COSIC, B-3001 Heverlee, Belgium
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the Monotone Span Program (MSP), that is the result of local multiplication of shares distributed by two given MSPs as well as the access structure that this resulting MSP computes. First, we expand the construction proposed by Cramer et al. for multiplying two different general access structures and we prove some properties of the resulting MSP. We prove that using two (different) MSPs to compute their resulting MSP is more efficient than building a multiplicative MSP. Next we define a (strongly) multiplicative resulting MSP and we prove that when one uses dual MSPs only all players together can compute the product. An analog of the algebraic simplification protocol of Gennaro et al. is presented. We show which conditions the resulting access structure should fulfill in order to achieve MPC secure, against an adaptive, active adversary in the zero-error case in both the computational and the information-theoretic model.
引用
收藏
页码:135 / 147
页数:13
相关论文
共 50 条
  • [21] On secret reconstruction in secret sharing schemes
    Wang, Huaxiong
    Wong, Duncan S.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (01) : 473 - 480
  • [22] Error correcting and complexity aspects of linear secret sharing schemes
    Desmedt, Y
    Kurosawa, K
    Le, TV
    INFORMATION SECURITY, PROCEEDINGS, 2003, 2851 : 396 - 407
  • [23] Constructions of some secret sharing schemes based on linear codes
    Ratseev, S. M.
    IZVESTIYA OF SARATOV UNIVERSITY MATHEMATICS MECHANICS INFORMATICS, 2024, 24 (03): : 330 - 341
  • [24] Secret sharing schemes from three classes of linear codes
    Yuan, J
    Ding, CS
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (01) : 206 - 212
  • [25] Requirements for group independent linear threshold secret sharing schemes
    King, B
    INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 89 - 106
  • [26] Efficient multiplicative sharing schemes
    Blackburn, SR
    Burmester, M
    Desmedt, Y
    Wild, PR
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 107 - 118
  • [27] Compact Verifiably Multiplicative Secret Sharing
    Yoshida, Maki
    Obana, Satoshi
    PROCEEDINGS OF 2020 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2020), 2020, : 437 - 441
  • [28] On d-Multiplicative Secret Sharing
    Barkol, Omer
    Ishai, Yuval
    Weinreb, Enav
    JOURNAL OF CRYPTOLOGY, 2010, 23 (04) : 580 - 593
  • [29] On d-Multiplicative Secret Sharing
    Omer Barkol
    Yuval Ishai
    Enav Weinreb
    Journal of Cryptology, 2010, 23 : 580 - 593
  • [30] On identification secret sharing schemes
    Cai, N
    Lam, KY
    INFORMATION AND COMPUTATION, 2003, 184 (02) : 298 - 310