Linear secret sharing schemes from error correcting codes and universal hash functions

52Citations
Citations of this article
46Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We present a novel method for constructing linear secret sharing schemes (LSSS) from linear error correcting codes and linear universal hash functions in a blackbox way. The main advantage of this new construction is that the privacy property of the resulting secret sharing scheme essentially becomes independent of the code we use, only depending on its rate. This allows us to fully harness the algorithmic properties of recent code constructions such as efficient encoding and decoding or efficient list-decoding. Choosing the error correcting codes and universal hash functions involved carefully, we obtain solutions to the following open problems: – A linear near-threshold secret sharing scheme with both linear time sharing and reconstruction algorithms and large secrets (i.e. secrets of size Ω(n)). Thus, the computational overhead per shared bit in this scheme is constant. – An efficiently reconstructible robust secret sharing scheme for n/3 ≤ t 0) with shares of optimal size O(1 + λ/n) and secrets of size Ω(n + λ), where λ is the security parameter.

Cite

CITATION STYLE

APA

Cramer, R., Damgård, I. B., Döttling, N., Fehr, S., & Spini, G. (2015). Linear secret sharing schemes from error correcting codes and universal hash functions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9057, pp. 313–336). Springer Verlag. https://doi.org/10.1007/978-3-662-46803-6_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free