Cryptology ePrint Archive: Report 2017/1032

Performing Computations on Hierarchically Shared Secrets

Giulia Traverso and Denise Demirel and Johannes Buchmann

Abstract: Hierarchical secret sharing schemes distribute a message to a set of shareholders with different reconstruction capabilities. In distributed storage systems, this is an important property because it allows to grant more reconstruction capability to better performing storage servers and vice versa. In particular, Tassa's conjunctive and disjunctive hierarchical secret sharing schemes are based on Birkhoff interpolation and perform equally well as Shamir's threshold secret sharing scheme. Thus, they are promising candidates for distributed storage systems. A key requirement is the possibility to perform function evaluations over shared data. However, practical algorithms supporting this have not been provided yet with respect to hierarchical secret sharing schemes. Aiming at closing this gap, in this work, we show how additions and multiplications of shares can be practically computed using Tassa's conjunctive and disjunctive hierarchical secret sharing schemes. Furthermore, we provide auditing procedures for operations on messages shared hierarchically, which allow to verify that functions on the shares have been performed correctly. We close this work with an evaluation of the correctness, security, and efficiency of the protocols we propose.

Category / Keywords: hierarchical secret sharing, Birkhoff interpolation, verifiable secret sharing, auditing, multi-party computation, distributed storage systems, cloud computing

Date: received 18 Oct 2017, last revised 29 Oct 2017

Contact author: gtraverso at cdc informatik tu-darmstadt de

Available format(s): PDF | BibTeX Citation

Version: 20171029:092322 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]