Linear Integer Secret Sharing

نویسنده

  • Rune Thorbek
چکیده

In this work, we introduce the Linear Integer Secret Sharing (LISS) scheme, which is a secret sharing scheme done directly over the integers. I.e., the generation of shares is done by an integer linear combination of the secret and some random integer values. The reconstruction of the secret is done directly by a linear integer combination of the shares of a qualified subset of the parties. The goal of this thesis is to investigate the advantages of the LISS scheme. That is, we investigate the following two questions. (i) Can we generalize previous results by using the LISS scheme? (ii) Can the LISS scheme be used to solve problems with new features previously not possible? To address question (i), we show that any LISS scheme can be used to build a secure distributed protocol for exponentiation in any group. This implies, for instance, that distributed RSA protocols for arbitrary access structures and with arbitrary public exponents, which generalizes previous results. The second question (ii) is answered when we present two universally composable and practical protocols by which a dealer can, verifiably and noninteractively, secret share an integer among a set of parties. Moreover, at small extra cost and using a distributed verifier proof, it can be shown in zeroknowledge that three shared integers a, b, c satisfy ab = c. This implies by known reductions, non-interactive zero-knowledge proofs that a shared integer is in a given interval, or that one secret integer is larger than another. Such primitives are useful, e.g., for supplying inputs to a multiparty computation protocol, such as an auction or an election. The protocols use various set-up assumptions, but do not require the random oracle model. While this answers the two questions in the affirmative, we continue to investigate the LISS scheme in this work. To emphasize one main result of this thesis, we reconsider Yao’s celebrated and heavily investigated question from 1982 [89], where a set of n parties want to evaluate an integer function f(x1, . . . , xn) of n integer variables of bounded range. Initially, party Pi knows the value of xi and no other xi’s. Is it possible for the parties to compute the value of f , by computing among themselves, without leaking information about their own secret input? One common restriction on previous results is that the function f is always assumed to be represented by an arithmetic circuit over a finite field F, i.e., the arithmetic is done in F. In most scenarios f should be an integer function like Yao proposed. This is solved by choosing F such that the computations can simulate it over the integers. This introduces two problems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions

A non-interactive (t,n)-publicly veriable secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for<...

متن کامل

Proactive Linear Integer Secret Sharing

In [3] Damgard and Thorbek proposed the linear integer secret sharing (LISS) scheme. In this note we show that the LISS scheme can be made proactive.

متن کامل

Linear Integer Secret Sharing and Distributed Exponentiation

We introduce the notion of Linear Integer Secret-Sharing (LISS) schemes, and show constructions of such schemes for any access structure. We show that any LISS scheme can be used to build a secure distributed protocol for exponentiation in any group. This implies, for instance, distributed RSA protocols for arbitrary access structures and with arbitrary public exponents.

متن کامل

Ideal Secret Sharing Schemes for Useful Multipartite Access Structures

This paper is a survey of the main results and open problems in a line of work that was initiated shortly after secret sharing was introduced. Namely, the construction of ideal linear secret sharing schemes for access structures that are natural generalizations of the threshold ones and have interesting properties for the applications. Some of them have hierarchical properties, while other ones...

متن کامل

Verifiable Secret Sharing Scheme Based on Integer Representation

In Shamir’s scheme that the security based on the numbers of the field of a prime number P which the coefficients' polynomial reduced to modulo P (takes a value from some field p Z , where P is a large prime number). Thus, the adversary must know only the free coefficient of the polynomial in order to break the scheme. Our scheme which based on representation integer using the so-called g a d i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009