2018
DOI: 10.1007/s10623-018-0578-y
|View full text |Cite
|
Sign up to set email alerts
|

Nearly optimal robust secret sharing

Abstract: We prove that a known general approach to improve Shamir's celebrated secret sharing scheme; i.e., adding an information-theoretic authentication tag to the secret, can make it robust for n parties against any collusion of size δn, for any constant δ ∈ (0, 1/2). Shamir's original scheme is robust for all δ ∈ (0, 1/3). Beyond that, we employ the best known list decoding algorithms for Reed-Solomon codes and show that, with high probability, only the correct secret maintains the correct information-theoretic tag… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…In particular,[3,7,9,11] use partly similar tools than we do but achieve weaker or incomparable results.…”
mentioning
confidence: 75%
See 2 more Smart Citations
“…In particular,[3,7,9,11] use partly similar tools than we do but achieve weaker or incomparable results.…”
mentioning
confidence: 75%
“…, H i , the E j 's for j ∈ H i \ H i−1 are random and independent for any i. 7 Therefore, we can apply Lemma 3 to…”
Section: Proposition 4 At the End Of Step II With Probability At Leastmentioning
confidence: 99%
See 1 more Smart Citation
“…However, such algorithms with side information were not developed for FRS codes in the literature. Listdecoding of FRS codes has been also incorporated in the context of secret sharing to enhance the security [20]- [22]. However, these works do not consider computations over data and are only concerned with recovering the data from the secret shares.…”
Section: B Related Workmentioning
confidence: 99%
“…This scheme can verify for n 3 ≤ t ≤ (1 − ε) • n 2 corrupted shares, while the size of each share is O(L + λ ), where λ is the security parameter, larger than that of secret O(L). Cheraghchi [22] showed a nearly optimal secret sharing method, which employs Reed-Solomon codes to tag a secret image to verify δ n, δ ∈ (0, 1 2) unreliable partners or shares and the size of shares is L…”
Section: A Related Workmentioning
confidence: 99%