Paper 2024/811
Traceable Secret Sharing Based on the Chinese Remainder Theorem
Abstract
Traceable threshold secret sharing schemes, introduced by Goyal, Song and Srinivasan (CRYPTO'21), allow to provably trace leaked shares to the parties that leaked them. The authors give the first definition and construction of traceable secret sharing schemes. However, the size of the shares in their construction are quadratic in the size of the secret. Boneh, Partap and Rotem (CRYPTO'24) recently proposed a new definition of traceable secret sharing and the first practical constructions. In their definition, one considers a reconstruction box
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Preprint.
- Keywords
- secret sharingtracingweighted access structureschinese remainder theorem
- Contact author(s)
- charlotte hoffmann @ ista ac at
- History
- 2024-05-27: approved
- 2024-05-24: received
- See all versions
- Short URL
- https://ia.cr/2024/811
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/811, author = {Charlotte Hoffmann}, title = {Traceable Secret Sharing Based on the Chinese Remainder Theorem}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/811}, year = {2024}, url = {https://eprint.iacr.org/2024/811} }