Multi-linear Secret-Sharing Schemes

被引:0
|
作者
Beimel, Amos [1 ]
Ben-Efraim, Aner [1 ,2 ]
Padro, Carles [3 ]
Tyomkin, Ilya [2 ]
机构
[1] Ben Gurion Univ Negev, Dept Comp Sci, Beer Sheva, Israel
[2] Ben Gurion Univ Negev, Dept Math, Beer Sheva, Israel
[3] Nanyang Technol Univ, Singapore, Singapore
来源
关键词
Ideal secret-sharing schemes; multi-linear matroids; Dowling geometries; MONOTONE SPAN PROGRAMS; PARTIAL FIELDS; LOWER BOUNDS; REPRESENTATIONS; CONSTRUCTIONS; MATROIDS; SIZE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Multi-linear secret-sharing schemes are the most common secret-sharing schemes. In these schemes the secret is composed of some field elements and the sharing is done by applying some fixed linear mapping on the field elements of the secret and some randomly chosen field elements. If the secret contains one field element, then the scheme is called linear. The importance of multi-linear schemes is that they provide a simple non-interactive mechanism for computing shares of linear combinations of previously shared secrets. Thus, they can be easily used in cryptographic protocols. In this work we study the power of multi-linear secret-sharing schemes. On one hand, we prove that ideal multi-linear secret-sharing schemes in which the secret is composed of p field elements are more powerful than schemes in which the secret is composed of less than p field elements (for every prime p). On the other hand, we prove super-polynomial lower bounds on the share size in multi-linear secret-sharing schemes. Previously, such lower bounds were known only for linear schemes.
引用
收藏
页码:394 / 418
页数:25
相关论文
共 50 条
  • [41] Projective k-arcs and 2-level secret-sharing schemes
    Gábor Korchmáros
    Valentino Lanzone
    Angelo Sonnino
    Designs, Codes and Cryptography, 2012, 64 : 3 - 15
  • [42] The Share Size of Secret-Sharing Schemes for Almost All Access Structures and Graphs
    Beimel, Amos
    Farras, Oriol
    THEORY OF CRYPTOGRAPHY, TCC 2020, PT III, 2020, 12552 : 499 - 529
  • [43] Linear multi-secret sharing schemes based on multi-party computation
    Liu, Mulan
    Xiao, Liangliang
    Zhang, Zhifang
    FINITE FIELDS AND THEIR APPLICATIONS, 2006, 12 (04) : 704 - 713
  • [44] THE BREADTH OF SHAMIR SECRET-SHARING SCHEME
    DAWSON, E
    DONOVAN, D
    COMPUTERS & SECURITY, 1994, 13 (01) : 69 - 78
  • [45] THE REVIEW ON THE THRESHOLD SECRET-SHARING SCHEME
    Wang Sen
    Xu Zhenning
    SECOND INTERNATIONAL SYMPOSIUM ON INNOVATION & SUSTAINABILITY OF MODERN RAILWAY - PROCEEDINGS OF ISMR '2010, 2010, : 241 - 243
  • [46] The Archistar Secret-Sharing Backup Proxy
    Happe, Andreas
    Wohner, Florian
    Loruenser, Thomas
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [47] Operations over Linear Secret Sharing Schemes
    Slinko, Arkadii
    DECISION AND GAME THEORY FOR SECURITY, 2019, 11836 : 513 - 524
  • [48] A quantum secret-sharing protocol with fairness
    Liu, Feng
    Qin, Su-Juan
    Wen, Qiao-Yan
    PHYSICA SCRIPTA, 2014, 89 (07)
  • [49] Secret-sharing matroids need not be algebraic
    Ben-Efraim, Aner
    DISCRETE MATHEMATICS, 2016, 339 (08) : 2136 - 2145
  • [50] Lattice-based threshold-changeability for standard CRT secret-sharing schemes
    Steinfeld, Ron
    Pieprzyk, Josef
    Wang, Huaxiong
    FINITE FIELDS AND THEIR APPLICATIONS, 2006, 12 (04) : 653 - 680