Paper 2021/186
Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages
Hemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, and Mingyuan Wang
Abstract
Efficient Reed-Solomon code reconstruction algorithms, for example, by Guruswami and Wootters (STOC--2016), translate into local leakage attacks on Shamir secret-sharing schemes over characteristic-2 fields. However, Benhamouda, Degwekar, Ishai, and Rabin (CRYPTO--2018) showed that the Shamir secret sharing scheme over prime-fields is leakage resilient to one-bit local leakage if the reconstruction threshold is roughly 0.87 times the total number of parties. In several application scenarios, like secure multi-party multiplication, the reconstruction threshold must be at most half the number of parties. Furthermore, the number of leakage bits that the Shamir secret sharing scheme is resilient to is also unclear.
Towards this objective, we study the Shamir secret-sharing scheme's leakage-resilience over a prime-field
Metadata
- Available format(s)
-
PDF
- Category
- Foundations
- Publication info
- Published elsewhere. Minor revision. EUROCRYPT 2021
- Keywords
- Random Punctured Reed-Solomon CodesPhysical-bit LeakageLocal Leakage ResilienceDiscrete Fourier AnalysisExponential SumsGeneralized Arithmetic ProgressionBezout TheoremIrwin-Hall Distribution
- Contact author(s)
- wang1929 @ purdue edu
- History
- 2021-03-02: revised
- 2021-02-20: received
- See all versions
- Short URL
- https://ia.cr/2021/186
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2021/186, author = {Hemanta K. Maji and Hai H. Nguyen and Anat Paskin-Cherniavsky and Tom Suad and Mingyuan Wang}, title = {Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages}, howpublished = {Cryptology {ePrint} Archive, Paper 2021/186}, year = {2021}, url = {https://eprint.iacr.org/2021/186} }