Welcome to the resource topic for
**2022/216**

**Title:**

Short Leakage Resilient and Non-malleable Secret Sharing Schemes

**Authors:**
Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar

**Abstract:**

Leakage resilient secret sharing (LRSS) allows a dealer to share a secret amongst n parties such that any authorized subset of the parties can recover the secret from their shares, while an adversary that obtains shares of any unauthorized subset of parties along with bounded leakage from the other shares learns no information about the secret. Non-malleable secret sharing (NMSS) provides a guarantee that even shares that are tampered by an adversary will reconstruct to either the original message or something independent of it. The most important parameter of LRSS and NMSS schemes is the size of each share. For LRSS, in the “local leakage model” (i.e., when the leakage functions on each share are independent of each other and bounded), Srinivasan and Vasudevan (CRYPTO 2019), gave a scheme for threshold access structures with a share size of approximately (3.(message length) + \mu), where \mu is the number of bits of leakage tolerated from every share. For the case of NMSS, the best known result (again due to the above work) has a share size of (11.(message length)). In this work, we build LRSS and NMSS schemes with much improved share sizes. Additionally, our LRSS scheme obtains optimal share and leakage size. In particular, we get the following results: -We build an information-theoretic LRSS scheme for threshold access structures with a share size of ((message length) + \mu). -As an application of the above result, we obtain an NMSS with a share size of (4.(message length)). Further, for the special case of sharing random messages, we obtain a share size of (2.(message length)).

**ePrint:**
https://eprint.iacr.org/2022/216

**Talk: **https://www.youtube.com/watch?v=EMcJjcy3oQI

**Slides: **https://iacr.org/submit/files/slides/2022/crypto/crypto2022/331/slides.pdf

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

**Example resources include:**
implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .