Extremal Set Theory and LWE Based Access Structure Hiding Verifiable Secret Sharing with Malicious-Majority and Free Verification
Secret sharing allows distributing a secret among several parties such that only authorized subsets, specified by an access structure, can reconstruct the secret. Sehrawat and Desmedt (COCOON 2020) introduced hidden access structures, that remain secret until some authorized subset of parties collab...
Gespeichert in:
Veröffentlicht in: | arXiv.org 2021-09 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Vipin Singh Sehrawat Yeo, Foo Yee Desmedt, Yvo |
description | Secret sharing allows distributing a secret among several parties such that only authorized subsets, specified by an access structure, can reconstruct the secret. Sehrawat and Desmedt (COCOON 2020) introduced hidden access structures, that remain secret until some authorized subset of parties collaborate. However, their scheme assumes semi-honest parties and supports only restricted access structures. We address these shortcomings by constructing an access structure hiding verifiable secret sharing scheme that supports all monotone access structures. It is the first secret sharing scheme to support cheater identification and share verifiability in malicious-majority settings. The verification procedure of our scheme incurs no communication overhead. As the building blocks of our scheme, we introduce and construct: (i) a set-system with \(> \exp\left(c\frac{2(\log h)^2}{(\log\log h)}\right)+2\exp\left(c\frac{(\log h)^2}{(\log\log h)}\right)\) subsets of a set of \(h\) elements. Our set-system, \(\mathcal{H}\), is defined over \(\mathbb{Z}_m\), where \(m\) is a non-prime-power. The size of each set in \(\mathcal{H}\) is divisible by \(m\) but the sizes of their pairwise intersections are not, unless one set is a subset of another, (ii) a new variant of the learning with errors (LWE) problem, called PRIM-LWE, wherein the secret matrix is sampled such that its determinant is a generator of \(\mathbb{Z}_q^*\), where \(q\) is the LWE modulus. The security of our scheme relies on the hardness of the LWE problem, and its share size is $$(1+ o(1)) \dfrac{2^{\ell}}{\sqrt{\pi \ell/2}}(2 q^{\varrho + 0.5} + \sqrt{q} + \mathrm{\Theta}(h)),$$ where \(\varrho \leq 1\) is a constant and \(\ell\) is the total number of parties. We also provide directions for future work to reduce the share size to \[\leq \dfrac{1}{3} \left( (1+ o(1)) \dfrac{2^{\ell}}{\sqrt{\pi \ell/2}}(2 q^{\varrho + 0.5} + 2\sqrt{q}) \right).\] |
doi_str_mv | 10.48550/arxiv.2011.14804 |
format | Article |
fullrecord | <record><control><sourceid>proquest_arxiv</sourceid><recordid>TN_cdi_arxiv_primary_2011_14804</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2465895889</sourcerecordid><originalsourceid>FETCH-LOGICAL-a529-edac6c13283050bf92f1f64e2880d2f42338f85fe4fc4c69e088220ef5a087453</originalsourceid><addsrcrecordid>eNotkE1PAjEQhhsTEwnyAzzZxPNiP5fuEQmICcTDEj1uSncqJcsutl2Fo__c5eM0h3mfNzMPQg-UDIWSkjxrf3A_Q0YoHVKhiLhBPcY5TZRg7A4NQtgSQlg6YlLyHvqbHqKHna5wDhGvNtD4I9Z1iRefU_yiA5R4bAyEgPPoWxNbD3juSld_4Q_wzjq9rqBjje_wfKP9afPr4gYvdeWMa9qQLPW28S5eemce4IoaHV1T36Nbq6sAg-vso9VsuprMk8X769tkvEi0ZFkCpTapoZwpTiRZ24xZalMBTClSMiu6F5VV0oKwRpg0A6IUYwSs1ESNhOR99HipPfsp9t7ttD8WJ0_F2VOXeLok9r75biHEYtu0vu5uKphIpcqkUhn_B3d2a5Q</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2465895889</pqid></control><display><type>article</type><title>Extremal Set Theory and LWE Based Access Structure Hiding Verifiable Secret Sharing with Malicious-Majority and Free Verification</title><source>arXiv.org</source><source>Free E- Journals</source><creator>Vipin Singh Sehrawat ; Yeo, Foo Yee ; Desmedt, Yvo</creator><creatorcontrib>Vipin Singh Sehrawat ; Yeo, Foo Yee ; Desmedt, Yvo</creatorcontrib><description>Secret sharing allows distributing a secret among several parties such that only authorized subsets, specified by an access structure, can reconstruct the secret. Sehrawat and Desmedt (COCOON 2020) introduced hidden access structures, that remain secret until some authorized subset of parties collaborate. However, their scheme assumes semi-honest parties and supports only restricted access structures. We address these shortcomings by constructing an access structure hiding verifiable secret sharing scheme that supports all monotone access structures. It is the first secret sharing scheme to support cheater identification and share verifiability in malicious-majority settings. The verification procedure of our scheme incurs no communication overhead. As the building blocks of our scheme, we introduce and construct: (i) a set-system with \(> \exp\left(c\frac{2(\log h)^2}{(\log\log h)}\right)+2\exp\left(c\frac{(\log h)^2}{(\log\log h)}\right)\) subsets of a set of \(h\) elements. Our set-system, \(\mathcal{H}\), is defined over \(\mathbb{Z}_m\), where \(m\) is a non-prime-power. The size of each set in \(\mathcal{H}\) is divisible by \(m\) but the sizes of their pairwise intersections are not, unless one set is a subset of another, (ii) a new variant of the learning with errors (LWE) problem, called PRIM-LWE, wherein the secret matrix is sampled such that its determinant is a generator of \(\mathbb{Z}_q^*\), where \(q\) is the LWE modulus. The security of our scheme relies on the hardness of the LWE problem, and its share size is $$(1+ o(1)) \dfrac{2^{\ell}}{\sqrt{\pi \ell/2}}(2 q^{\varrho + 0.5} + \sqrt{q} + \mathrm{\Theta}(h)),$$ where \(\varrho \leq 1\) is a constant and \(\ell\) is the total number of parties. We also provide directions for future work to reduce the share size to \[\leq \dfrac{1}{3} \left( (1+ o(1)) \dfrac{2^{\ell}}{\sqrt{\pi \ell/2}}(2 q^{\varrho + 0.5} + 2\sqrt{q}) \right).\]</description><identifier>EISSN: 2331-8422</identifier><identifier>DOI: 10.48550/arxiv.2011.14804</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Computer Science - Cryptography and Security ; Construction ; Intersections ; Mathematics - Combinatorics ; Set theory ; Supports</subject><ispartof>arXiv.org, 2021-09</ispartof><rights>2021. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,776,780,881,27902</link.rule.ids><backlink>$$Uhttps://doi.org/10.1016/j.tcs.2021.07.022$$DView published paper (Access to full text may be restricted)$$Hfree_for_read</backlink><backlink>$$Uhttps://doi.org/10.48550/arXiv.2011.14804$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Vipin Singh Sehrawat</creatorcontrib><creatorcontrib>Yeo, Foo Yee</creatorcontrib><creatorcontrib>Desmedt, Yvo</creatorcontrib><title>Extremal Set Theory and LWE Based Access Structure Hiding Verifiable Secret Sharing with Malicious-Majority and Free Verification</title><title>arXiv.org</title><description>Secret sharing allows distributing a secret among several parties such that only authorized subsets, specified by an access structure, can reconstruct the secret. Sehrawat and Desmedt (COCOON 2020) introduced hidden access structures, that remain secret until some authorized subset of parties collaborate. However, their scheme assumes semi-honest parties and supports only restricted access structures. We address these shortcomings by constructing an access structure hiding verifiable secret sharing scheme that supports all monotone access structures. It is the first secret sharing scheme to support cheater identification and share verifiability in malicious-majority settings. The verification procedure of our scheme incurs no communication overhead. As the building blocks of our scheme, we introduce and construct: (i) a set-system with \(> \exp\left(c\frac{2(\log h)^2}{(\log\log h)}\right)+2\exp\left(c\frac{(\log h)^2}{(\log\log h)}\right)\) subsets of a set of \(h\) elements. Our set-system, \(\mathcal{H}\), is defined over \(\mathbb{Z}_m\), where \(m\) is a non-prime-power. The size of each set in \(\mathcal{H}\) is divisible by \(m\) but the sizes of their pairwise intersections are not, unless one set is a subset of another, (ii) a new variant of the learning with errors (LWE) problem, called PRIM-LWE, wherein the secret matrix is sampled such that its determinant is a generator of \(\mathbb{Z}_q^*\), where \(q\) is the LWE modulus. The security of our scheme relies on the hardness of the LWE problem, and its share size is $$(1+ o(1)) \dfrac{2^{\ell}}{\sqrt{\pi \ell/2}}(2 q^{\varrho + 0.5} + \sqrt{q} + \mathrm{\Theta}(h)),$$ where \(\varrho \leq 1\) is a constant and \(\ell\) is the total number of parties. We also provide directions for future work to reduce the share size to \[\leq \dfrac{1}{3} \left( (1+ o(1)) \dfrac{2^{\ell}}{\sqrt{\pi \ell/2}}(2 q^{\varrho + 0.5} + 2\sqrt{q}) \right).\]</description><subject>Computer Science - Cryptography and Security</subject><subject>Construction</subject><subject>Intersections</subject><subject>Mathematics - Combinatorics</subject><subject>Set theory</subject><subject>Supports</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><sourceid>GOX</sourceid><recordid>eNotkE1PAjEQhhsTEwnyAzzZxPNiP5fuEQmICcTDEj1uSncqJcsutl2Fo__c5eM0h3mfNzMPQg-UDIWSkjxrf3A_Q0YoHVKhiLhBPcY5TZRg7A4NQtgSQlg6YlLyHvqbHqKHna5wDhGvNtD4I9Z1iRefU_yiA5R4bAyEgPPoWxNbD3juSld_4Q_wzjq9rqBjje_wfKP9afPr4gYvdeWMa9qQLPW28S5eemce4IoaHV1T36Nbq6sAg-vso9VsuprMk8X769tkvEi0ZFkCpTapoZwpTiRZ24xZalMBTClSMiu6F5VV0oKwRpg0A6IUYwSs1ESNhOR99HipPfsp9t7ttD8WJ0_F2VOXeLok9r75biHEYtu0vu5uKphIpcqkUhn_B3d2a5Q</recordid><startdate>20210913</startdate><enddate>20210913</enddate><creator>Vipin Singh Sehrawat</creator><creator>Yeo, Foo Yee</creator><creator>Desmedt, Yvo</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>AKY</scope><scope>AKZ</scope><scope>GOX</scope></search><sort><creationdate>20210913</creationdate><title>Extremal Set Theory and LWE Based Access Structure Hiding Verifiable Secret Sharing with Malicious-Majority and Free Verification</title><author>Vipin Singh Sehrawat ; Yeo, Foo Yee ; Desmedt, Yvo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a529-edac6c13283050bf92f1f64e2880d2f42338f85fe4fc4c69e088220ef5a087453</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Construction</topic><topic>Intersections</topic><topic>Mathematics - Combinatorics</topic><topic>Set theory</topic><topic>Supports</topic><toplevel>online_resources</toplevel><creatorcontrib>Vipin Singh Sehrawat</creatorcontrib><creatorcontrib>Yeo, Foo Yee</creatorcontrib><creatorcontrib>Desmedt, Yvo</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>arXiv Computer Science</collection><collection>arXiv Mathematics</collection><collection>arXiv.org</collection><jtitle>arXiv.org</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Vipin Singh Sehrawat</au><au>Yeo, Foo Yee</au><au>Desmedt, Yvo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Extremal Set Theory and LWE Based Access Structure Hiding Verifiable Secret Sharing with Malicious-Majority and Free Verification</atitle><jtitle>arXiv.org</jtitle><date>2021-09-13</date><risdate>2021</risdate><eissn>2331-8422</eissn><abstract>Secret sharing allows distributing a secret among several parties such that only authorized subsets, specified by an access structure, can reconstruct the secret. Sehrawat and Desmedt (COCOON 2020) introduced hidden access structures, that remain secret until some authorized subset of parties collaborate. However, their scheme assumes semi-honest parties and supports only restricted access structures. We address these shortcomings by constructing an access structure hiding verifiable secret sharing scheme that supports all monotone access structures. It is the first secret sharing scheme to support cheater identification and share verifiability in malicious-majority settings. The verification procedure of our scheme incurs no communication overhead. As the building blocks of our scheme, we introduce and construct: (i) a set-system with \(> \exp\left(c\frac{2(\log h)^2}{(\log\log h)}\right)+2\exp\left(c\frac{(\log h)^2}{(\log\log h)}\right)\) subsets of a set of \(h\) elements. Our set-system, \(\mathcal{H}\), is defined over \(\mathbb{Z}_m\), where \(m\) is a non-prime-power. The size of each set in \(\mathcal{H}\) is divisible by \(m\) but the sizes of their pairwise intersections are not, unless one set is a subset of another, (ii) a new variant of the learning with errors (LWE) problem, called PRIM-LWE, wherein the secret matrix is sampled such that its determinant is a generator of \(\mathbb{Z}_q^*\), where \(q\) is the LWE modulus. The security of our scheme relies on the hardness of the LWE problem, and its share size is $$(1+ o(1)) \dfrac{2^{\ell}}{\sqrt{\pi \ell/2}}(2 q^{\varrho + 0.5} + \sqrt{q} + \mathrm{\Theta}(h)),$$ where \(\varrho \leq 1\) is a constant and \(\ell\) is the total number of parties. We also provide directions for future work to reduce the share size to \[\leq \dfrac{1}{3} \left( (1+ o(1)) \dfrac{2^{\ell}}{\sqrt{\pi \ell/2}}(2 q^{\varrho + 0.5} + 2\sqrt{q}) \right).\]</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><doi>10.48550/arxiv.2011.14804</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2021-09 |
issn | 2331-8422 |
language | eng |
recordid | cdi_arxiv_primary_2011_14804 |
source | arXiv.org; Free E- Journals |
subjects | Computer Science - Cryptography and Security Construction Intersections Mathematics - Combinatorics Set theory Supports |
title | Extremal Set Theory and LWE Based Access Structure Hiding Verifiable Secret Sharing with Malicious-Majority and Free Verification |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T19%3A33%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_arxiv&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Extremal%20Set%20Theory%20and%20LWE%20Based%20Access%20Structure%20Hiding%20Verifiable%20Secret%20Sharing%20with%20Malicious-Majority%20and%20Free%20Verification&rft.jtitle=arXiv.org&rft.au=Vipin%20Singh%20Sehrawat&rft.date=2021-09-13&rft.eissn=2331-8422&rft_id=info:doi/10.48550/arxiv.2011.14804&rft_dat=%3Cproquest_arxiv%3E2465895889%3C/proquest_arxiv%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2465895889&rft_id=info:pmid/&rfr_iscdi=true |