the torsion limit for algebraic function fields and its
play

The Torsion-Limit for Algebraic Function Fields and Its Application - PowerPoint PPT Presentation

The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing Ignacio Cascudo (CWI Amsterdam) Ronald Cramer (CWI & Leiden Univ.) Chaoping Xing (NTU Singapore) CRYPTO 2011 Thursday, August 18, 2011


  1. The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing Ignacio Cascudo (CWI Amsterdam) Ronald Cramer (CWI & Leiden Univ.) Chaoping Xing (NTU Singapore) CRYPTO 2011 Thursday, August 18, 2011 Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  2. n -Codes Let F q be a finite field, k , n ∈ Z ≥ 1 ( k “size of the secret”, n “number of shares”). Definition ( n -Code) An n -code for F k q is a F q -vector subspace C ⊂ F k q × F n q such that Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  3. n -Codes Let F q be a finite field, k , n ∈ Z ≥ 1 ( k “size of the secret”, n “number of shares”). Definition ( n -Code) An n -code for F k q is a F q -vector subspace C ⊂ F k q × F n q such that The “secret” coordinate* of C can take any value in F k q . 1 *Think of x ∈ C as x = ( x 0 , x 1 , . . . , x n ) where: x 0 ∈ F k q secret “coordinate” x 1 , . . . , x n ∈ F q share coordinates. Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  4. n -Codes Let F q be a finite field, k , n ∈ Z ≥ 1 ( k “size of the secret”, n “number of shares”). Definition ( n -Code) An n -code for F k q is a F q -vector subspace C ⊂ F k q × F n q such that The “secret” coordinate* of C can take any value in F k q . 1 The n “share” coordinates of C jointly determine the secret 2 coordinate. *Think of x ∈ C as x = ( x 0 , x 1 , . . . , x n ) where: x 0 ∈ F k q secret “coordinate” x 1 , . . . , x n ∈ F q share coordinates. Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  5. Definition ( r -reconstructing) An n -code C for F k q is r-reconstructing (1 ≤ r ≤ n ) if it holds that any r shares determine the secret. Note that an n -code is n -reconstructing by definition. Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  6. Definition ( r -reconstructing) An n -code C for F k q is r-reconstructing (1 ≤ r ≤ n ) if it holds that any r shares determine the secret. Note that an n -code is n -reconstructing by definition. Definition ( t -Disconnected and t -Uniform n -Code) An n -code C for F k q is t-disconnected if t = 0, or else if 1 ≤ t < n , the secret is “ independent ” of any t shares. Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  7. Definition ( r -reconstructing) An n -code C for F k q is r-reconstructing (1 ≤ r ≤ n ) if it holds that any r shares determine the secret. Note that an n -code is n -reconstructing by definition. Definition ( t -Disconnected and t -Uniform n -Code) An n -code C for F k q is t-disconnected if t = 0, or else if 1 ≤ t < n , the secret is “ independent ” of any t shares. If, additionally, any set of t shares is uniformly distributed in F t q C has t-uniformity . Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  8. Definition (Powers of an n -Code) Let d ∈ Z > 0 .For C an n -code for F k q , let C ∗ d := F q < { c ( 1 ) ∗ . . . ∗ c ( d ) : c ( 1 ) , . . . , c ( d ) ∈ C } > . (where ∗ denotes coordinatewise product) Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  9. Definition (Powers of an n -Code) Let d ∈ Z > 0 .For C an n -code for F k q , let C ∗ d := F q < { c ( 1 ) ∗ . . . ∗ c ( d ) : c ( 1 ) , . . . , c ( d ) ∈ C } > . (where ∗ denotes coordinatewise product) Remark (Powering Need Not Preserve n -Code) q be an n-code for S. Consider C ∗ d (d ≥ 2 ). Let C ⊂ F k q × F n Trivially, the secret coordinate of C ∗ d can take any value. Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  10. Definition (Powers of an n -Code) Let d ∈ Z > 0 .For C an n -code for F k q , let C ∗ d := F q < { c ( 1 ) ∗ . . . ∗ c ( d ) : c ( 1 ) , . . . , c ( d ) ∈ C } > . (where ∗ denotes coordinatewise product) Remark (Powering Need Not Preserve n -Code) q be an n-code for S. Consider C ∗ d (d ≥ 2 ). Let C ⊂ F k q × F n Trivially, the secret coordinate of C ∗ d can take any value. But : the share coordinates of C ∗ d need not determine the secret coordinate. Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  11. Definition (Powers of an n -Code) Let d ∈ Z > 0 .For C an n -code for F k q , let C ∗ d := F q < { c ( 1 ) ∗ . . . ∗ c ( d ) : c ( 1 ) , . . . , c ( d ) ∈ C } > . (where ∗ denotes coordinatewise product) Remark (Powering Need Not Preserve n -Code) q be an n-code for S. Consider C ∗ d (d ≥ 2 ). Let C ⊂ F k q × F n Trivially, the secret coordinate of C ∗ d can take any value. But : the share coordinates of C ∗ d need not determine the secret coordinate. Thus: C ∗ d need not be an n -code for F k q . Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  12. Arithmetic Secret Sharing Schemes Definition An ( n , t , d , r ) -arithmetic secret sharing scheme for F k q (over F q ) is an n -code C for F k q such that: t ≥ 1, d ≥ 2. 1 The n -code C is t -disconnected. 2 C ∗ d is in fact an n -code for F k q . 3 The n -code C ∗ d is r -reconstructing. 4 Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  13. Arithmetic Secret Sharing Schemes Definition An ( n , t , d , r ) -arithmetic secret sharing scheme for F k q (over F q ) is an n -code C for F k q such that: t ≥ 1, d ≥ 2. 1 The n -code C is t -disconnected. 2 C ∗ d is in fact an n -code for F k q . 3 The n -code C ∗ d is r -reconstructing. 4 The arithmetic SSS has uniformity if, in addition, the n -code C has t -uniformity. Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  14. Arithmetic Secret Sharing Schemes Definition An ( n , t , d , r ) -arithmetic secret sharing scheme for F k q (over F q ) is an n -code C for F k q such that: t ≥ 1, d ≥ 2. 1 The n -code C is t -disconnected. 2 C ∗ d is in fact an n -code for F k q . 3 The n -code C ∗ d is r -reconstructing. 4 The arithmetic SSS has uniformity if, in addition, the n -code C has t -uniformity. An ( n , t , 2 , n − t ) -arithmetic SSS is a t-strong multiplicative linear SSS (Cramer/Damgaard/Maurer EUROCRYPT 2000). This notion is in turn generalized by arithmetic codices. Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  15. Asymptotics of Arithmetic Secret Sharing Schemes Remark (Arithmetic SSS exist) If n + k ≤ q and d ( t + k − 1 ) < n − t, then: Shamir (or Franklin/Yung for k > 1 ) schemes are ( n , t , d , n − t ) -arithmetic SSS with uniformity for F k q . Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  16. Asymptotics of Arithmetic Secret Sharing Schemes Remark (Arithmetic SSS exist) If n + k ≤ q and d ( t + k − 1 ) < n − t, then: Shamir (or Franklin/Yung for k > 1 ) schemes are ( n , t , d , n − t ) -arithmetic SSS with uniformity for F k q . Question (2006): What happens if q is fixed and n is unbounded? Can positive rates ( t = Ω( n ) ) be achieved? (Note: We consider d constant, as otherwise t = Ω( n ) is provably imposible). Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  17. Previous results Can positive rates ( t = Ω( n ) ) be achieved? Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  18. Previous results Can positive rates ( t = Ω( n ) ) be achieved? Chen/Cramer (2006): Yes, if A ( q ) > 2 d .* Includes q square with q > ( 2 d + 1 ) 2 and all q very large. * A ( q ) Ihara’s constant of F q Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  19. Previous results Can positive rates ( t = Ω( n ) ) be achieved? Chen/Cramer (2006): Yes, if A ( q ) > 2 d .* Includes q square with q > ( 2 d + 1 ) 2 and all q very large. Cascudo/Chen/Cramer/Xing(2009): For d = 2 and without uniformity , any finite field F q . * A ( q ) Ihara’s constant of F q Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  20. Applications Original application: IT-secure multi-party computation, malicious adversary case (Cramer/Damgaard/Maurer 2000). Asymptotical version of BenOr/Goldwasser/Wigderson88, Chaum/Crépeau/Damgaard88 Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  21. Applications Original application: IT-secure multi-party computation, malicious adversary case (Cramer/Damgaard/Maurer 2000). Asymptotical version of BenOr/Goldwasser/Wigderson88, Chaum/Crépeau/Damgaard88 But lately: Unexpected applications in two-party cryptography , usually via MPC-in-the-head paradigm: “secure two-party computation” with small error and low communication . “Players” are virtual processes!. Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend