Towards optimal robust secret sharing with security against a rushing adversary
Serge Fehr and Chen Yuan
Abstract
Robust secret sharing enables the reconstruction of a secret-shared message in the presence of up to (out of ) {\em incorrect} shares. The most challenging case is when , which is the largest for which the task is still possible, but only up to a small error probability and with some overhead in the share size.
Recently, Bishop, Pastro, Rajaraman and Wichs proposed a scheme with an (almost) optimal overhead of . This seems to answer the open question posed by Cevallos et al. who proposed a scheme with overhead of and asked whether the linear dependency on was necessary or not.
However, a subtle issue with Bishop et al.'s solution is that it (implicitly) assumes a {\em non-rushing} adversary, and thus it satisfies a {\em weaker} notion of security compared to the scheme by Cevallos et al. or to the classical scheme by Rabin and BenOr.
In this work, we almost close this gap. We propose a new robust secret sharing scheme that offers full security against a rushing adversary, and that has an overhead of , where is arbitrary but fixed.
This -factor is obviously worse than the -factor hidden in the notation of the scheme of Bishop et al., but it greatly improves on the linear dependency on of the best known scheme that features security against a rushing adversary.
A small variation of our scheme has the same overhead as the scheme of Bishop et al.\ {\em and} achieves security against a rushing adversary, but suffers from a (slightly) superpolynomial reconstruction complexity.
@misc{cryptoeprint:2019/246,
author = {Serge Fehr and Chen Yuan},
title = {Towards optimal robust secret sharing with security against a rushing adversary},
howpublished = {Cryptology {ePrint} Archive, Paper 2019/246},
year = {2019},
url = {https://eprint.iacr.org/2019/246}
}
Note: In order to protect the privacy of readers, eprint.iacr.org
does not use cookies or embedded third party content.