Leakage-resilient secret sharing with constant share size

In this work, we consider the leakage-resilience of algebraic-geometric (AG for short) codes based ramp secret sharing schemes extending the analysis on the leakage-resilience of linear threshold secret sharing schemes over prime fields that is done by Benhamouda et al. in the effort to construct li...

Full description

Saved in:
Bibliographic Details
Main Authors: Tjuawinata, Ivan, Xing, Chaoping
Other Authors: School of Computer Science and Engineering
Format: Article
Language:English
Published: 2023
Subjects:
Online Access:https://hdl.handle.net/10356/168032
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-168032
record_format dspace
spelling sg-ntu-dr.10356-1680322023-05-19T15:36:16Z Leakage-resilient secret sharing with constant share size Tjuawinata, Ivan Xing, Chaoping School of Computer Science and Engineering Strategic Centre for Research on Privacy-Preserving Technologies and Systems Engineering::Computer science and engineering Secret Sharing Scheme Algebraic Geometric Code In this work, we consider the leakage-resilience of algebraic-geometric (AG for short) codes based ramp secret sharing schemes extending the analysis on the leakage-resilience of linear threshold secret sharing schemes over prime fields that is done by Benhamouda et al. in the effort to construct linear leakage-resilient secret sharing schemes with constant share size. Since there does not exist any explicit efficient construction of AG codes over prime fields with constant field size, we consider constructions over prime fields with the help of concatenation method and constructions of codes over field extensions. Extending the Fourier analysis done by Benhamouda et al., one can show that concatenated algebraic geometric codes over prime fields do produce some nice leakage-resilient secret sharing schemes. One natural and curious question is whether AG codes over extension fields produce better leakage-resilient secret sharing schemes than the construction based on concatenated AG codes. Such construction provides several advantage compared to the construction over prime fields using concatenation method. It is clear that AG codes over extension fields give secret sharing schemes with a smaller reconstruction threshold for a fixed privacy parameter t. In this work, it is also confirmed that indeed AG codes over extension fields have stronger leakage-resilience under some reasonable assumptions. Furthermore, we also show that AG codes over extension fields may provide strong multiplicative property which may be used in its application to the study of multiparty computation. In contrast, the same cannot be said for constructions based on concatenated AG codes, even when we are considering multiplication friendly embeddings. These advantages strongly motivate the study of secret sharing schemes from AG codes over extension fields. The current paper has two main contributions: (i) we obtain leakage-resilient secret sharing schemes with constant share sizes and unbounded numbers of players. Some of the schemes constructed without the use of concatenation also possesses strong multiplicative property (ii) via Fourier Analysis, we analyze the leakage-resilience of secret sharing schemes from codes over extension fields. This is of its own theoretical interest independent of its application to secret sharing schemes from algebraic geometric codes over extension fields. National Research Foundation (NRF) Submitted/Accepted version The work of Ivan Tjuawinata was supported by the National Research Foundation, Singapore, under its Strategic Capability Research Centres Funding Initiative. The work of Chaoping Xing was supported in part by the National Key Research and Development Project under Grant 2021YFE0109900 and Grant 2020YFA0712300 and in part by the Natural Science Foundation of China under Grant 12031011. 2023-05-19T05:21:36Z 2023-05-19T05:21:36Z 2022 Journal Article Tjuawinata, I. & Xing, C. (2022). Leakage-resilient secret sharing with constant share size. IEEE Transactions On Information Theory, 68(12), 8228-8250. https://dx.doi.org/10.1109/TIT.2022.3198407 0018-9448 https://hdl.handle.net/10356/168032 10.1109/TIT.2022.3198407 2-s2.0-85137579333 12 68 8228 8250 en IEEE Transactions on Information Theory © 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/TIT.2022.3198407. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Computer science and engineering
Secret Sharing Scheme
Algebraic Geometric Code
spellingShingle Engineering::Computer science and engineering
Secret Sharing Scheme
Algebraic Geometric Code
Tjuawinata, Ivan
Xing, Chaoping
Leakage-resilient secret sharing with constant share size
description In this work, we consider the leakage-resilience of algebraic-geometric (AG for short) codes based ramp secret sharing schemes extending the analysis on the leakage-resilience of linear threshold secret sharing schemes over prime fields that is done by Benhamouda et al. in the effort to construct linear leakage-resilient secret sharing schemes with constant share size. Since there does not exist any explicit efficient construction of AG codes over prime fields with constant field size, we consider constructions over prime fields with the help of concatenation method and constructions of codes over field extensions. Extending the Fourier analysis done by Benhamouda et al., one can show that concatenated algebraic geometric codes over prime fields do produce some nice leakage-resilient secret sharing schemes. One natural and curious question is whether AG codes over extension fields produce better leakage-resilient secret sharing schemes than the construction based on concatenated AG codes. Such construction provides several advantage compared to the construction over prime fields using concatenation method. It is clear that AG codes over extension fields give secret sharing schemes with a smaller reconstruction threshold for a fixed privacy parameter t. In this work, it is also confirmed that indeed AG codes over extension fields have stronger leakage-resilience under some reasonable assumptions. Furthermore, we also show that AG codes over extension fields may provide strong multiplicative property which may be used in its application to the study of multiparty computation. In contrast, the same cannot be said for constructions based on concatenated AG codes, even when we are considering multiplication friendly embeddings. These advantages strongly motivate the study of secret sharing schemes from AG codes over extension fields. The current paper has two main contributions: (i) we obtain leakage-resilient secret sharing schemes with constant share sizes and unbounded numbers of players. Some of the schemes constructed without the use of concatenation also possesses strong multiplicative property (ii) via Fourier Analysis, we analyze the leakage-resilience of secret sharing schemes from codes over extension fields. This is of its own theoretical interest independent of its application to secret sharing schemes from algebraic geometric codes over extension fields.
author2 School of Computer Science and Engineering
author_facet School of Computer Science and Engineering
Tjuawinata, Ivan
Xing, Chaoping
format Article
author Tjuawinata, Ivan
Xing, Chaoping
author_sort Tjuawinata, Ivan
title Leakage-resilient secret sharing with constant share size
title_short Leakage-resilient secret sharing with constant share size
title_full Leakage-resilient secret sharing with constant share size
title_fullStr Leakage-resilient secret sharing with constant share size
title_full_unstemmed Leakage-resilient secret sharing with constant share size
title_sort leakage-resilient secret sharing with constant share size
publishDate 2023
url https://hdl.handle.net/10356/168032
_version_ 1772828830308761600