On multiplicative linear secret sharing schemes

被引:0
|
作者
Nikov, V
Nikova, S
Preneel, B
机构
[1] Eindhoven Univ Technol, Dept Math & Comp Sci, NL-5600 MB Eindhoven, Netherlands
[2] Katholieke Univ Leuven, Dept Elect Engn, ESAT COSIC, B-3001 Heverlee, Belgium
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the Monotone Span Program (MSP), that is the result of local multiplication of shares distributed by two given MSPs as well as the access structure that this resulting MSP computes. First, we expand the construction proposed by Cramer et al. for multiplying two different general access structures and we prove some properties of the resulting MSP. We prove that using two (different) MSPs to compute their resulting MSP is more efficient than building a multiplicative MSP. Next we define a (strongly) multiplicative resulting MSP and we prove that when one uses dual MSPs only all players together can compute the product. An analog of the algebraic simplification protocol of Gennaro et al. is presented. We show which conditions the resulting access structure should fulfill in order to achieve MPC secure, against an adaptive, active adversary in the zero-error case in both the computational and the information-theoretic model.
引用
收藏
页码:135 / 147
页数:13
相关论文
共 50 条
  • [41] Security of Linear Secret-Sharing Schemes Against Mass Surveillance
    Giacomelli, Irene
    Olimid, Ruxandra F.
    Ranellucci, Samuel
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 43 - 58
  • [42] Secret Sharing Schemes from Linear Codes over Finite Rings
    Qian, Jianfa
    Ma, Wenping
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (07) : 1193 - 1196
  • [43] Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
    Beimel, Amos
    Farras, Oriol
    Mintz, Yuval
    Peter, Naty
    THEORY OF CRYPTOGRAPHY, TCC 2017, PT II, 2017, 10678 : 394 - 423
  • [44] Finding lower bounds on the complexity of secret sharing schemes by linear programming
    Padro, Carles
    Vazquez, Leonor
    Yang, An
    DISCRETE APPLIED MATHEMATICS, 2013, 161 (7-8) : 1072 - 1084
  • [45] Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures
    Eriguchi, Reo
    Kunihiro, Noboru
    Nuida, Koji
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (05) : 1751 - 1778
  • [46] Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures
    Reo Eriguchi
    Noboru Kunihiro
    Koji Nuida
    Designs, Codes and Cryptography, 2023, 91 : 1751 - 1778
  • [47] Strongly Multiplicative Hierarchical Threshold Secret Sharing
    Kasper, Emilia
    Nikov, Ventzislav
    Nikova, Svetla
    INFORMATION THEORETIC SECURITY, 2009, 4883 : 148 - +
  • [48] Visual secret sharing schemes for plural secret images
    Iwamoto, M
    Yamamoto, H
    2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 283 - 283
  • [49] Verifiable Secret Redistribution for Proactive Secret Sharing Schemes
    于佳
    孔凡玉
    李大兴
    JournalofShanghaiJiaotongUniversity(Science), 2006, (02) : 236 - 241
  • [50] Linear codes from weakly regular plateaued functions and their secret sharing schemes
    Mesnager, Sihem
    Ozbudak, Ferruh
    Sinak, Ahmet
    DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (2-3) : 463 - 480