New Upper Bounds for Evolving Secret Sharing via Infinite Branching Programs

Bar Alon, Amos Beimel, Tamar Ben David, Eran Omri, Anat Paskin-Cherniavsky

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Abstract

    Evolving secret-sharing schemes, defined by Komargodski, Naor, and Yogev [TCC 2016B], are secret-sharing schemes in which there is no a-priory bound on the number of parties. In such schemes, parties arrive one by one; when a party arrives, the dealer gives it a share and cannot update this share in later stages. The requirement is that some predefined sets (called authorized sets) should be able to reconstruct the secret, while other sets should learn no information on the secret. The collection of authorized sets that can reconstruct the secret is called an evolving access structure. The challenge of the dealer is to be able to give short shares to the current parties without knowing how many parties will arrive in the future. The requirement that the dealer cannot update shares is designed to prevent expensive updates. Komargodski et al. constructed an evolving secret-sharing scheme for every monotone evolving access structure; the share size of the tth party in this scheme is 2t-1. Recently, Mazor [ITC 2023] proved that evolving secret-sharing schemes require exponentially-long shares for some evolving access structures, namely shares of size 2t-o(t). In light of these results, our goal is to construct evolving secret-sharing schemes with non-trivial share size for wide classes of evolving access structures; e.g., schemes with share size 2ct for c<1 or even polynomial size. We provide several results achieving this goal: (1) We define layered infinite branching programs representing evolving access structures, show how to transform them into generalized infinite decision trees, and show how to construct evolving secret-sharing schemes for generalized infinite decision trees. Combining these steps, we get a secret-sharing scheme realizing the evolving access structure. As an application of this framework, we construct an evolving secret-sharing scheme with non-trivial share size for access structures that can be represented by layered infinite branching programs with width at layer t of at most 20.15t. If the width is polynomial, then we get an evolving secret-sharing scheme with quasi-polynomial share size. (2) We construct efficient evolving secret-sharing schemes for dynamic-threshold access structures with high dynamic-threshold and for infinite 2-slice and 3-slice access structures. (3) We prove lower bounds on the share size of evolving secret-sharing schemes for infinite k-hypergraph access structures and for infinite directed st-connectivity access structures. As a by-product of the lower bounds, we provide the first non-trivial lower bound for finite directed st-connectivity access structures for general secret-sharing schemes.

    Original languageEnglish
    Title of host publicationTheory of Cryptography - 22nd International Conference, TCC 2024, Proceedings
    EditorsElette Boyle, Elette Boyle, Mohammad Mahmoody
    PublisherSpringer Science and Business Media Deutschland GmbH
    Pages548-580
    Number of pages33
    ISBN (Print)9783031780226
    DOIs
    StatePublished - 2025
    Event22nd Theory of Cryptography Conference, TCC 2024 - Milan, Italy
    Duration: 2 Dec 20246 Dec 2024

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume15367 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference22nd Theory of Cryptography Conference, TCC 2024
    Country/TerritoryItaly
    CityMilan
    Period2/12/246/12/24

    Fingerprint

    Dive into the research topics of 'New Upper Bounds for Evolving Secret Sharing via Infinite Branching Programs'. Together they form a unique fingerprint.

    Cite this