How to Share a Secret, Infinitely
نویسندگان
چکیده
Secret sharing schemes allow a dealer to distribute a secret piece of information among several parties so that any qualified subset of parties can reconstruct the secret, while every unqualified subset of parties learns nothing about the secret. The collection of qualified subsets is called an access structure. The best known access structure is the k-threshold one, where any subset of size k or more is qualified and all smaller subsets are not qualified. A major issue is the size of the shares needed to assure this property. For the threshold access structure, when k = 2 and there are n parties it is known that the share size must be log n even for secrets of 1 bit. In this work we consider the case where the set of parties is not known in advanced and could potentially be infinite. We would still like to give the t party arriving a small share as possible as a function of t. We show that for any access structure it is possible to do so by giving shares of size 2t−1. Our main result is a scheme for k-threshold access structure with shares of size (k− 1) · log t+ poly(k) · o(log t) bits. Finally, we prove that no secret sharing scheme for the 2-threshold access structure with share size at most log t+ log log t+O(1) exists. ∗Weizmann Institute of Science, Israel. Email: {ilan.komargodski,moni.naor,eylon.yogev}@weizmann.ac.il. Supported in part by a grant from the I-CORE Program of the Planning and Budgeting Committee, the Israel Science Foundation, BSF and the Israeli Ministry of Science and Technology. Moni Naor is the incumbent of the Judith Kleeman Professorial Chair. Ilan Komargodski is supported in part by a Levzion fellowship.
منابع مشابه
How to infinitely share a secret more efficiently
We device a general secret sharing scheme for evolving access structures (following [KNY16]). Our scheme has (sub)exponentially smaller share complexity (share of i’th party) for certain access structures compared to the general scheme in [5]. We stress that unlike [5]’s scheme, our scheme requires that the entire evolving access structure is known in advance. Revising, [5]’s scheme (in its mos...
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملEthics and politics in Joseph Conrad’s The Secret Agent And Bozorg Alavi’s Her Eyes
In this paper, the writers try to compare two authors, the Iranian leftist, Bozorg Alavi (1904-1997) and the Polish Joseph Conrad (1857-1924). Although these two writers have different attitudes to Socialism and the question of revolution, both share Romantic idealism and a tragic sense of personal and social life. Moreover, they both are precursors of modernist novel in their countries, and sh...
متن کاملAn Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کاملHow to Split a Secret into Unknown Shares
Secret sharing allows a dealer to distribute a secret among multiple parties such that authorized coalitions can reconstruct the secret. Traditionally, the dealer knows the exact share each user holds. Grigoriev and Shpilrain recently considered secret sharing systems for which the dealer does not know the share of a particular party and introduced a construction for the special case of all-or-...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016