Secret sharing lower bound: Either reconstruction is hard or shares are long

Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

8 Citations (Scopus)

Abstract

A secret sharing scheme allows a dealer to distribute shares of a secret among a set of n parties $$P=\{p:1,\dots,p_n\}$$ such that any authorized subset of parties can reconstruct the secret, yet any unauthorized subset learns nothing about it. The family $$\mathcal {A} \subseteq 2^P$$ of all authorized subsets is called the access structure. Classic results show that if $$\mathcal {A}$$ contains precisely all subsets of cardinality at least t, then there exists a secret sharing scheme where the length of the shares is proportional to $$\lg n$$ bits plus the length of the secret. However, for general access structures, the best known upper bounds have shares of length exponential in n, whereas the strongest lower bound shows that the shares must have length at least $$n/\lg n$$. Beimel conjectured that the exponential upper bound is tight, but proving it has so far resisted all attempts. In this paper we make progress towards proving the conjecture by showing that there exists an access structure $$\mathcal {A}$$, such that any secret sharing scheme for $$\mathcal {A}$$ must have either exponential share length, or the function used for reconstructing the secret by authorized parties must have an exponentially long description. As an example corollary, we conclude that if one insists that authorized parties can reconstruct the secret via a constant fan-in boolean circuit of size polynomial in the share length, then there exists an access structure that requires a share length that is exponential in n.

Original languageEnglish
Title of host publicationSecurity and Cryptography for Networks
EditorsClemente Galdi, Vladimir Kolesnikov
Number of pages13
Place of publicationCham
PublisherSpringer
Publication date2020
Pages566-578
ISBN (Print)9783030579890
ISBN (Electronic)978-3-030-57990-6
DOIs
Publication statusPublished - 2020
Event12th International Conference on Security and Cryptography for Networks, SCN 2020 - Amalfi, Italy
Duration: 14 Sept 202016 Sept 2020

Conference

Conference12th International Conference on Security and Cryptography for Networks, SCN 2020
Country/TerritoryItaly
CityAmalfi
Period14/09/202016/09/2020
SeriesLecture Notes in Computer Science
Volume12238
ISSN0302-9743

Fingerprint

Dive into the research topics of 'Secret sharing lower bound: Either reconstruction is hard or shares are long'. Together they form a unique fingerprint.

Cite this