On multiplicative linear secret sharing schemes

被引:0
|
作者
Nikov, V
Nikova, S
Preneel, B
机构
[1] Eindhoven Univ Technol, Dept Math & Comp Sci, NL-5600 MB Eindhoven, Netherlands
[2] Katholieke Univ Leuven, Dept Elect Engn, ESAT COSIC, B-3001 Heverlee, Belgium
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the Monotone Span Program (MSP), that is the result of local multiplication of shares distributed by two given MSPs as well as the access structure that this resulting MSP computes. First, we expand the construction proposed by Cramer et al. for multiplying two different general access structures and we prove some properties of the resulting MSP. We prove that using two (different) MSPs to compute their resulting MSP is more efficient than building a multiplicative MSP. Next we define a (strongly) multiplicative resulting MSP and we prove that when one uses dual MSPs only all players together can compute the product. An analog of the algebraic simplification protocol of Gennaro et al. is presented. We show which conditions the resulting access structure should fulfill in order to achieve MPC secure, against an adaptive, active adversary in the zero-error case in both the computational and the information-theoretic model.
引用
收藏
页码:135 / 147
页数:13
相关论文
共 50 条
  • [31] On Proactive Secret Sharing Schemes
    Nikov, V
    Nikova, S
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 308 - 325
  • [32] Secret sharing schemes on graphs
    Csirmaz, Laszlo
    STUDIA SCIENTIARUM MATHEMATICARUM HUNGARICA, 2007, 44 (03) : 297 - 306
  • [33] PERFECT SECRET SHARING SCHEMES
    Parvatov, K. G.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2008, 2 (02): : 50 - 57
  • [34] Partial Secret Sharing Schemes
    Jafari, Amir
    Khazaei, Shahram
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (08) : 5364 - 5385
  • [35] Efficient Secret Sharing Schemes
    Lv, Chunli
    Jia, Xiaoqi
    Lin, Jingqiang
    Jing, Jiwu
    Tian, Lijun
    Sun, Mingli
    SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 114 - +
  • [36] Anonymous secret sharing schemes
    Blundo, C
    Stinson, DR
    DISCRETE APPLIED MATHEMATICS, 1997, 77 (01) : 13 - 28
  • [37] Explication of secret sharing schemes
    Stinson, D.R.
    Designs, Codes, and Cryptography, 1992, 2 (04)
  • [38] Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
    Beimel, Amos
    Farras, Oriol
    Mintz, Yuval
    Peter, Naty
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (03) : 2083 - 2100
  • [39] Linear codes from perfect nonlinear mappings and their secret sharing schemes
    Carlet, C
    Ding, CS
    Yuan, J
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (06) : 2089 - 2102
  • [40] Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming
    Padro, Carles
    Vazquez, Leonor
    LATIN 2010: THEORETICAL INFORMATICS, 2010, 6034 : 344 - 355