Multi-linear Secret-Sharing Schemes

被引:0
|
作者
Beimel, Amos [1 ]
Ben-Efraim, Aner [1 ,2 ]
Padro, Carles [3 ]
Tyomkin, Ilya [2 ]
机构
[1] Ben Gurion Univ Negev, Dept Comp Sci, Beer Sheva, Israel
[2] Ben Gurion Univ Negev, Dept Math, Beer Sheva, Israel
[3] Nanyang Technol Univ, Singapore, Singapore
来源
关键词
Ideal secret-sharing schemes; multi-linear matroids; Dowling geometries; MONOTONE SPAN PROGRAMS; PARTIAL FIELDS; LOWER BOUNDS; REPRESENTATIONS; CONSTRUCTIONS; MATROIDS; SIZE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Multi-linear secret-sharing schemes are the most common secret-sharing schemes. In these schemes the secret is composed of some field elements and the sharing is done by applying some fixed linear mapping on the field elements of the secret and some randomly chosen field elements. If the secret contains one field element, then the scheme is called linear. The importance of multi-linear schemes is that they provide a simple non-interactive mechanism for computing shares of linear combinations of previously shared secrets. Thus, they can be easily used in cryptographic protocols. In this work we study the power of multi-linear secret-sharing schemes. On one hand, we prove that ideal multi-linear secret-sharing schemes in which the secret is composed of p field elements are more powerful than schemes in which the secret is composed of less than p field elements (for every prime p). On the other hand, we prove super-polynomial lower bounds on the share size in multi-linear secret-sharing schemes. Previously, such lower bounds were known only for linear schemes.
引用
收藏
页码:394 / 418
页数:25
相关论文
共 50 条
  • [31] A Linear Construction of Secret Sharing Schemes
    Marten van Dijk
    Designs, Codes and Cryptography, 1997, 12 (2) : 161 - 201
  • [32] Genuine secret-sharing states
    Minjin Choi
    Soojoon Lee
    Quantum Information Processing, 2021, 20
  • [33] General secure multi-party computation from any linear secret-sharing scheme
    Cramer, R
    Damgård, I
    Maurer, U
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 316 - 334
  • [34] Lattice-based threshold changeability for standard shamir secret-sharing schemes
    Steinfeld, Ron
    Pieprzyk, Josef
    Wang, Huaxiong
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2007, 53 (07) : 2542 - 2559
  • [35] Efficient multi-party quantum secret-sharing protocol
    Xin, Xiangjun
    He, Fan
    Qiu, Shujing
    Li, Chaoyang
    Li, Fagen
    CHINESE JOURNAL OF PHYSICS, 2024, 92 : 664 - 674
  • [36] A Lower Bound on the Share Size of Leakage-Resilient Secret-Sharing Schemes
    Dutta, Sabyasachi
    Jiang, Shaoquan
    Safavi-Naini, Reihaneh
    NEW ADVANCES IN DESIGNS, CODES AND CRYPTOGRAPHY, NADCC 2022, 2024, 86 : 125 - 139
  • [37] Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes
    Eriguchi, Reo
    Kunihiro, Noboru
    2019 IEEE INFORMATION THEORY WORKSHOP (ITW), 2019, : 264 - 268
  • [38] Projective k-arcs and 2-level secret-sharing schemes
    Korchmaros, Gabor
    Lanzone, Valentino
    Sonnino, Angelo
    DESIGNS CODES AND CRYPTOGRAPHY, 2012, 64 (1-2) : 3 - 15
  • [39] Classification of a class of A3MDS code and applications in secret-sharing schemes
    Pandey, Bandana
    Paul, Prabal
    DISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS, 2024, 16 (07)
  • [40] ENew generalized secret-sharing schemes with points on a hyperplane using a Wronskian matrix
    Loucks, Weston
    Yildiz, Bahattin
    INVOLVE, A JOURNAL OF MATHEMATICS, 2020, 13 (02): : 257 - 279