We present a novel method for constructing linear secret sharing schemes (LSSS) from linear error correcting codes and linear universal hash functions in a blackbox way. The main advantage of this new construction is that the privacy property of the resulting secret sharing scheme essentially becomes independent of the code we use, only depending on its rate. This allows us to fully harness the algorithmic properties of recent code constructions such as efficient encoding and decoding or efficient list-decoding. Choosing the error correcting codes and universal hash functions involved carefully, we obtain solutions to the following open problems: – A linear near-threshold secret sharing scheme with both linear time sharing and reconstruction algorithms and large secrets (i.e. secrets of size Ω(n)). Thus, the computational overhead per shared bit in this scheme is constant. – An efficiently reconstructible robust secret sharing scheme for n/3 ≤ t 0) with shares of optimal size O(1 + λ/n) and secrets of size Ω(n + λ), where λ is the security parameter.
CITATION STYLE
Cramer, R., Damgård, I. B., Döttling, N., Fehr, S., & Spini, G. (2015). Linear secret sharing schemes from error correcting codes and universal hash functions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9057, pp. 313–336). Springer Verlag. https://doi.org/10.1007/978-3-662-46803-6_11
Mendeley helps you to discover research relevant for your work.