[Resource Topic] 2018/1144: Revisiting Non-Malleable Secret Sharing

Welcome to the resource topic for 2018/1144

Title:
Revisiting Non-Malleable Secret Sharing

Authors: Saikrishna Badrinarayanan, Akshayaram Srinivasan

Abstract:

A threshold secret sharing scheme (with threshold t) allows a dealer to share a secret among a set of parties such that any group of t or more parties can recover the secret and no group of at most t-1 parties learn any information about the secret. A non-malleable threshold secret sharing scheme, introduced in the recent work of Goyal and Kumar (STOC’18), additionally protects a threshold secret sharing scheme when its shares are subject to tampering attacks. Specifically, it guarantees that the reconstructed secret from the tampered shares is either the original secret or something that is unrelated to the original secret. In this work, we continue the study of threshold non-malleable secret sharing against the class of tampering functions that tamper each share independently. We focus on achieving greater efficiency and guaranteeing a stronger security property. We obtain the following results: - Rate Improvement. We give the first construction of a threshold non-malleable secret sharing scheme that has rate > 0. Specifically, for every n,t \geq 4, we give a construction of a t-out-of-n non-malleable secret sharing scheme with rate \Theta(\frac{1}{t\log ^2 n}). In the prior constructions, the rate was \Theta(\frac{1}{n\log m}) where m is the length of the secret and thus, the rate tends to 0 as m \rightarrow \infty. Furthermore, we also optimize the parameters of our construction and give a concretely efficient scheme. - Multiple Tampering. We give the first construction of a threshold non-malleable secret sharing scheme secure in the stronger setting of bounded tampering wherein the shares are tampered by multiple (but bounded in number) possibly different tampering functions. The rate of such a scheme is \Theta(\frac{1}{k^3t\log^2 n}) where k is an apriori bound on the number of tamperings. We complement this positive result by proving that it is impossible to have a threshold non-malleable secret sharing scheme that is secure in the presence of an apriori unbounded number of tamperings. - General Access Structures. We extend our results beyond threshold secret sharing and give constructions of rate-efficient, non-malleable secret sharing schemes for more general monotone access structures that are secure against multiple (bounded) tampering attacks.

ePrint: https://eprint.iacr.org/2018/1144

Talk: https://www.youtube.com/watch?v=UARTYiDQwYc

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .