Open AccessProceedings Article
Secret Sharing with Public Reconstruction (Extended Abstract)
Amos Beimel,Benny Chor +1 more
- pp 353-366
Reads0
Chats0
TLDR
In this paper, the authors investigated the cost of performing the reconstruction over public communication channels, and showed that a naive implementation of this task distributes O(n) one times pads to each party.Abstract:
All known constructions of information theoretic t-out-of-n secret sharing schemes require secure, private communication channels among the parties for the reconstruction of the secret. In this work we investigate the cost of performing the reconstruction over public communication channels. A naive implementation of this task distributes O(n) one times pads to each party. This results in shares whose size is O(n) times the secret size. We present three implementations of such schemes that are substantially more efficient: - A scheme enabling multiple reconstructions of the secret by different subsets of parties, with factor O(n/t) increase in the shares' size. - A one-time scheme, enabling a single reconstruction of the secret, with O(log(n/t)) increase in the shares' size. - A one-time scheme, enabling a single reconstruction by a set of size exactly t, with factor O(1) increase in the shares' size. We prove that the first implementation is optimal (up to constant factors) by showing a tight ?(n/t) lower bound for the increase in the shares' size.read more
Citations
More filters
Journal ArticleDOI
Secret sharing schemes with partial broadcast channels
Rei Safavi-Naini,Huaxiong Wang +1 more
TL;DR: It is shown that a necessary and sufficient condition for the partial broadcast channel allocation of a (t, n)-threshold partial broadcast secret sharing scheme is equivalent to a combinatorial object called a cover-free family, and a lower bound on the communication rate is derived.
References
More filters
Book
Elements of information theory
Thomas M. Cover,Joy A. Thomas +1 more
TL;DR: The author examines the role of entropy, inequality, and randomness in the design of codes and the construction of codes in the rapidly changing environment.
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
How to share a secret
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Proceedings ArticleDOI
Safeguarding cryptographic keys
TL;DR: Certain cryptographic keys, such as a number which makes it possible to compute the secret decoding exponent in an RSA public key cryptosystem, 1 , 5 or the system master key and certain other keys in a DES cryptos system, 3 are so important that they present a dilemma.
Journal ArticleDOI
Secret key agreement by public discussion from common information
TL;DR: It is shown that such a secret key agreement is possible for a scenario in which all three parties receive the output of a binary symmetric source over independent binary asymmetric channels, even when the enemy's channel is superior to the other two channels.