Paper 2025/292

Tight Lower Bounds and New Upper Bounds For Evolving CDS

Tamar Ben David, Ariel University
Anat Paskin-Cherniavsky, Ariel University
Abstract

Komargodski et. al. defined evolving secret-sharing schemes with an unbounded number of parties. In this model, parties arrive one after the other and the number of parties that will arrive is not known. Another cryptographic primitive related to secret-sharing is conditional disclosure of secrets protocols (CDS) that defined by Gertner et. al. A CDS protocol for a Boolean function involves servers and a referee. Each server holds a common secret , a common random string , and a private input ; using these , each server locally computes one message and sends it to the referee. The referee, knowing the inputs and the messages, should be able to compute if . Otherwise, the referee should not learn information about the secret. In a sense, this is a non-monotone version of secret sharing schemes. Peter (ISC 23'), defines evolving CDS, implementing in particular evolving predicate (he handles somewhat more general predicates for larger input domains, but generalizing to other input domains is not hard, and we focus on boolean predicates). In this setting, the number of parties is unbounded, where the parties arrive in sequential order. Each party, when arrives, sends one random message to a referee, that depending on its input, the secret, and a common randomness. He also devise evolving CDS protocols for a general evolving predicate via a black-box reduction to evolving secret-sharing scheme for a related access structure. He analyzes this construction for general access structures, as well as other classes of functions, which yields message complexity for the worst predicates. In this work we provide new upper and lower bounds for evolving CDS. Observing that CDS has the potential for improved efficiency, as it is not restricted to monotone operations, we devise a new evolving general CDS construction. In particular, our construction relies on representing the evolving predicate via an infinite branching program - LINBP, generalizing the monotone infinite branching program based construction of Alon et. al of evolving secret sharing schemes. We obtain nontrivial ( for ) message complexity for branching programs of larger width than Alon et al's construction (even when restricting attention to monotone predicates), as well as Peter's construction for certain (but not all) 's. Indeed, we prove that our construction, as well as Peter's article (ISC 23’) is tight for a certain evolving predicate -- as for evolving secret-sharing, (so called strong) evolving CDS also requires share complexity of . This is unlike the state of affairs for the finite setting, where the best known CDS constructions are much more efficient than the best known secret sharing schemes (for the hardest monotone functions). The latter bound is proved based on an adaptation of Mazor's lower bound (in turns based on Csirmaz's lower bounding technique) to the CDS setting. It relies on a reduction from secret sharing for a certain class of infinite access structures -- the so called partite access structures to evolving CDS for a related (not necessarily monotone) function. Then, a partite evolving access structure is crafted using the Csirmaz-type argument.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Preprint.
Keywords
Evolving secret-sharingEvolving CDSbranching programgeneralized infinite decision tree
Contact author(s)
tamarbd @ ariel ac il
anatpc @ ariel ac il
History
2025-02-20: approved
2025-02-19: received
See all versions
Short URL
https://ia.cr/2025/292
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/292,
      author = {Tamar Ben David and Anat Paskin-Cherniavsky},
      title = {Tight Lower Bounds and New Upper Bounds For Evolving {CDS}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/292},
      year = {2025},
      url = {https://eprint.iacr.org/2025/292}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.