advanced tools from modern cryptography
play

Advanced Tools from Modern Cryptography Lecture 3 Secret-Sharing - PowerPoint PPT Presentation

Advanced Tools from Modern Cryptography Lecture 3 Secret-Sharing (ctd.) Secret-Sharing Last time (n,t) secret-sharing (n,n) via additive secret-sharing Shamir secret-sharing for general (n,t) Shamir secret-sharing is a linear


  1. Advanced Tools from Modern Cryptography Lecture 3 Secret-Sharing (ctd.)

  2. Secret-Sharing Last time (n,t) secret-sharing (n,n) via additive secret-sharing Shamir secret-sharing for general (n,t) Shamir secret-sharing is a linear secret-sharing scheme

  3. Linear Secret-Sharing Linear Secret-Sharing over a field: message and shares are field elements WT [ M r ] = sT Reconstruction by a set T ⊆ [n] : solve for M R T R T M Reconstruction vector s W r R T with support in T, s.t. R T ⋅ W = [1 0 … 0] Randomness used by Each share is a the sharing algorithm set of coordinates

  4. Linear Secret-Sharing: Computing on Shares Suppose two secrets m 1 and m 2 shared using the same secret-sharing scheme σ 1 σ 2 m 1 m 2 p p c 11 c 21 1 1 q q c 12 c 22 = W : : : : c 1,u c 2,u σ 1n σ 2n Then for any p,q ∈ F , shares of p ⋅ m 1 + q ⋅ m 2 can be computed locally by each party i as σ i = p ⋅ σ 1i + q ⋅ σ 2i

  5. Linear Secret-Sharing: Computing on Shares More generally, can compute shares of any linear transformation σ 1 σ 2 m 1 m 2 m v σ v1 Q Q c 11 c 21 c v1 1 1 c 12 c 22 c v2 = W : : : : : : c 1,u c 2,u c v,u σ 1n σ 2n σ vn Each row computed locally by a party

  6. Switching Schemes Can move from any linear secret-sharing scheme W to any other linear secret-sharing scheme Z “securely” w 1 = m R : w n Given shares (w 1 , …, w n ) ← W .Share(m) Share each w i using scheme Z: ( σ i1 ,…, σ in ) ← Z.Share(w i ) Locally each party j reconstructs using scheme W: z j ← W .Recon ( σ 1j ,…, σ nj ) m w 1 c 1 c = 2 W : : c t -1 w n

  7. Switching Schemes Can move from any linear secret-sharing scheme W to any other linear secret-sharing scheme Z “securely” w 1 = m R : w n Given shares (w 1 , …, w n ) ← W .Share(m) Share each w i using scheme Z: ( σ i1 ,…, σ in ) ← Z.Share(w i ) Locally each party j reconstructs using scheme W: z j ← W .Recon ( σ 1j ,…, σ nj ) w 1 w 2 w n σ 11 σ 21 σ v1 c 11 c 21 c v1 c 12 … c 22 c v2 = Z … : : : : : : c 1,u c 2,u c v,u σ 2n σ vn σ 1n Party i picks i th column

  8. Switching Schemes Can move from any linear secret-sharing scheme W to any other linear secret-sharing scheme Z “securely” w 1 = m R : w n Given shares (w 1 , …, w n ) ← W .Share(m) Share each w i using scheme Z: ( σ i1 ,…, σ in ) ← Z.Share(w i ) Locally each party j reconstructs using scheme W: z j ← W .Recon ( σ 1j ,…, σ nj ) w 1 w 2 w n σ 11 σ 21 σ v1 z 1 c 11 c 21 c v1 c 12 … c 22 c v2 = = R R Z … : : : : : : : c 1,u c 2,u c v,u m σ 2n σ vn σ 1n z n r 1 r 2 : r u’ Party j computes j th row

  9. Switching Schemes Can move from any linear secret-sharing scheme W to any other linear secret-sharing scheme Z “securely” Given shares (w 1 , …, w n ) ← W .Share(m) Share each w i using scheme Z: ( σ i1 ,…, σ in ) ← Z.Share(w i ) Locally each party j reconstructs using scheme W: z j ← W .Recon ( σ 1j ,…, σ nj ) Note that if a set of parties T ⊆ [n] is allowed to learn the secret by either W or Z, then T learns m from either the shares it started with or the ones it ended up with Claim: If T ⊆ [n] is not allowed to learn the secret by both W and Z, then T learns nothing about m from this process Exercise

  10. More General Access Structures Idea: For arbitrary monotonic access structure A , there is a “basis” B of minimal sets in A . For each S in B generate an (|S|,|S|) sharing, and distribute them to the members of S. n | B | = ( t ) Works, but very “inefficient” How big is B ? (Say when A is a threshold access structure) Total share complexity = ∑ S ∈ B |S| field elements. (Compare n t ⋅ ( t ) with Shamir’ s scheme: n field elements in all.) More efficient schemes known for large classes of access structures

  11. More General Access Structures Msg A simple generalization of (2,3) threshold access structures Shares A threshold tree to specify the access structure (2,3) (1,3) (2,2) Can realize by recursively Shares of shares threshold secret-sharing the shares Note: linear secret-sharing Fact: Access structures that admit linear secret-sharing are those which can be specified using “monotone span programs”

  12. Efficiency Main measure: size of the shares (say, total of all shares) Shamir’ s: each share is as as big as the secret (a single field element) Naïve scheme for arbitrary monotonic access structure: if a party is in N sets in B , N basic shares N can be exponential in n (as B can have exponentially many sets) Share size must be at least as big as the secret: “last share” in a minimal authorized set should contain all the information about the secret Ideal: if all shares are only this big (e.g. Shamir’ s scheme) Not all access structures have ideal schemes Non-linear schemes can be more efficient than linear schemes

  13. A More General Formulation Access structure consists of a monotonically “increasing” family A (allowed to learn), and a monotonically “decreasing” family F (forbidden from learning), with A ∩ F = Ø T ∈ A ⇒ ∀ S ⊇ T, S ∈ A . T ∈ F ⇒ ∀ S ⊆ T, S ∈ F . For T ∉ A ∪ F , no requirements of secrecy or learning the message E.g., Ramp secret-sharing scheme: A = { S ⊆ [n] | |S| ≥ t } and F = { S ⊆ [n] | |S| ≤ s }, where s < t When s = t-1, a threshold secret-sharing scheme

  14. Packed Secret-Sharing Shamir’ s scheme can be generalized to a ramp scheme, such that longer secrets can be shared with the same share size m j = f(z j ) and s i = f(a i ) where {z 1 ,…,z k } ∩ {a 1 ,…,a n } = Ø and f has degree t-1 (t being the reconstruction threshold) Access structure: A = { S : |S| ≥ t } and F = { S : |S| ≤ t-k } m A R T R T = c s W Reconstruction matrix R T with support in columns Random, conditioned Each share is a T, s.t. R T ⋅ W = A on Ac = m set of coordinates T ∈ A if A spanned by W T , and T ∈ F if every row of A independent of W T

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend