Paper 2024/1610

Secret Sharing with Snitching

Stefan Dziembowski, University of Warsaw and IDEAS NCBR
Sebastian Faust, Technische Universität Darmstadt
Tomasz Lizurej, University of Warsaw and NASK
Marcin Mielniczuk, University of Warsaw
Abstract

We address the problem of detecting and punishing shareholder collusion in secret-sharing schemes. We do it in the recently proposed cryptographic model called individual cryptography (Dziembowski, Faust, and Lizurej, Crypto 2023), which assumes that there exist tasks that can be efficiently computed by a single machine but distributing this computation across multiple (mutually distrustful devices) is infeasible. Within this model, we introduce a novel primitive called secret sharing with snitching (SSS), in which each attempt to illegally reconstruct the shared secret $S$ results in a proof that can be used to prove such misbehavior (and, e.g., financially penalize the cheater on a blockchain). This holds in a very strong sense, even if the shareholders attempt not to reconstruct the entire secret~$S$ but only learn some partial information about it. Our notion also captures the attacks performed using multiparty computation protocols (MPCs), i.e., those where the malicious shareholders use MPCs to compute partial information on $S$. The main idea of SSS is that any illegal reconstruction can be proven and punished, which suffices to discourage illegal secret reconstruction. Hence, our SSS scheme effectively prevents shareholders' collusion. We provide a basic definition of threshold ($t$-out-of-$n$) SSS. We then show how to construct it for $t = n$, and later, we use this construction to build an SSS scheme for an arbitrary $t$. In order to prove the security of our construction, we introduce a generalization of the random oracle model (Bellare, Rogaway, CCS 1993), which allows modelling hash evaluations made inside MPC.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Published elsewhere. Minor revision. ACM CCS 2024
Keywords
secret sharingcollusion preventionfront-running prevention
Contact author(s)
stefan dziembowski @ crypto edu pl
sebastian faust @ tu-darmstadt de
tomasz lizurej @ crypto edu pl
m mielniczuk @ uw edu pl
History
2024-10-11: approved
2024-10-09: received
See all versions
Short URL
https://ia.cr/2024/1610
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1610,
      author = {Stefan Dziembowski and Sebastian Faust and Tomasz Lizurej and Marcin Mielniczuk},
      title = {Secret Sharing with Snitching},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1610},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1610}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.