Paper 2024/736
Secret Sharing with Certified Deletion
Abstract
Secret sharing allows a user to split a secret into many shares so that the secret can be recovered if, and only if, an authorized set of shares is collected. Although secret sharing typically does not require any computational hardness assumptions, its security does require that an adversary cannot collect an authorized set of shares. Over long periods of time where an adversary can benefit from multiple data breaches, this may become an unrealistic assumption.
We initiate the systematic study of secret sharing with certified deletion in order to achieve security even against an adversary that eventually collects an authorized set of shares. In secret sharing with certified deletion, a (classical) secret
Metadata
- Available format(s)
-
PDF
- Category
- Foundations
- Publication info
- A major revision of an IACR publication in CRYPTO 2024
- Keywords
- QuantumCertified DeletionSecret SharingRandomness Extractors
- Contact author(s)
-
bartusek james @ gmail com
jraizes @ cmu edu - History
- 2024-05-16: approved
- 2024-05-13: received
- See all versions
- Short URL
- https://ia.cr/2024/736
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/736, author = {James Bartusek and Justin Raizes}, title = {Secret Sharing with Certified Deletion}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/736}, year = {2024}, url = {https://eprint.iacr.org/2024/736} }