Leakage Resilient Secret Sharing and Applications

作者: Akshayaram Srinivasan , Prashant Nalini Vasudevan

DOI: 10.1007/978-3-030-26951-7_17

关键词: Set (abstract data type)Bounded functionDiscrete mathematicsBinary logarithmSecrecyLeakage (electronics)Computer scienceSecret sharing

摘要: A secret sharing scheme allows a dealer to share among set of n parties such that any authorized subset the can recover secret, while unauthorized learns no information about secret. leakage-resilient (introduced in independent works by Goyal and Kumar, STOC ’18 Benhamouda, Degwekar, Ishai Rabin, CRYPTO ’18) additionally requires secrecy hold against every even if they obtain some bounded leakage from other share. The is said be local it computed independently for each So far, only known constructions resilient schemes are threshold access structures very low (O(1)) or high (\(n -o(\log n)\)) thresholds.

参考文章(52)
Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, Hong-Sheng Zhou, Multi-input Functional Encryption theory and application of cryptographic techniques. pp. 578- 602 ,(2014) , 10.1007/978-3-642-55220-5_32
Amos Beimel, Secret-sharing schemes: a survey IWCC'11 Proceedings of the Third international conference on Coding and cryptology. pp. 11- 46 ,(2011) , 10.1007/978-3-642-20901-7_2
David Chaum, Claude Crépeau, Ivan Damgård, Multiparty Unconditionally Secure Protocols (Extended Abstract) symposium on the theory of computing. pp. 11- 19 ,(1988)
Leonid Reyzin, Silvio Micali, Physically Observable Cryptography (Extended Abstract). theory of cryptography conference. pp. 278- 296 ,(2004)
Amos Beimel, Ariel Gabizon, Yuval Ishai, Eyal Kushilevitz, Sigurd Meldgaard, Anat Paskin-Cherniavsky, Non-Interactive Secure Multiparty Computation Advances in Cryptology – CRYPTO 2014. ,vol. 2014, pp. 387- 404 ,(2014) , 10.1007/978-3-662-44381-1_22
Avi Wigderson, Shafi Goldwasser, Michael Ben-Or, Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract) symposium on the theory of computing. pp. 1- 10 ,(1988)
Silvio Micali, Leonid Reyzin, Physically observable cryptography theory of cryptography conference. pp. 278- 296 ,(2004) , 10.1007/978-3-540-24638-1_16
Shai Halevi, Yehuda Lindell, Benny Pinkas, None, Secure computation on the web: computing without simultaneous interaction international cryptology conference. ,vol. 2011, pp. 132- 150 ,(2011) , 10.1007/978-3-642-22792-9_8
Joël Alwen, Yevgeniy Dodis, Daniel Wichs, Survey: Leakage Resilience and the Bounded Retrieval Model Lecture Notes in Computer Science. pp. 1- 18 ,(2010) , 10.1007/978-3-642-14496-7_1