TY - GEN
T1 - Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family
AU - Maji, Hemanta K.
AU - Nguyen, Hai H.
AU - Paskin-Cherniavsky, Anat
AU - Suad, Tom
AU - Wang, Mingyuan
AU - Ye, Xiuyu
AU - Yu, Albert
N1 - Publisher Copyright:
© 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.
PY - 2022
Y1 - 2022
N2 - Motivated by leakage-resilient secure computation of circuits with addition and multiplication gates, this work studies the leakage-resilience of linear secret-sharing schemes with a small reconstruction threshold against any bounded-size family of joint leakage attacks, i.e., the leakage function can leak global information from all secret shares. We first prove that, with high probability, the Massey secret-sharing scheme corresponding to a random linear code over a finite field F is leakage-resilient against any ℓ -bit joint leakage family of size at most | F| k-2.01/ 8 ℓ, where k is the reconstruction threshold. Our result (1) bypasses the bottleneck due to the existing Fourier-analytic approach, (2) enables secure multiplication of secrets, and (3) is near-optimal. We use combinatorial and second-moment techniques to prove the result. Next, we show that the Shamir secret-sharing scheme over a prime-order field F with randomly chosen evaluation places and with threshold k is leakage-resilient to any ℓ -bit joint leakage family of size at most | F| 2k-n-2.01/ (k! · 8 ℓ) with high probability. We prove this result by marrying our proof techniques for the first result with the existing Fourier analytical approach. Moreover, it is unlikely that one can extend this result beyond k/ n⩽ 0.5 due to the technical hurdle for the Fourier-analytic approach.
AB - Motivated by leakage-resilient secure computation of circuits with addition and multiplication gates, this work studies the leakage-resilience of linear secret-sharing schemes with a small reconstruction threshold against any bounded-size family of joint leakage attacks, i.e., the leakage function can leak global information from all secret shares. We first prove that, with high probability, the Massey secret-sharing scheme corresponding to a random linear code over a finite field F is leakage-resilient against any ℓ -bit joint leakage family of size at most | F| k-2.01/ 8 ℓ, where k is the reconstruction threshold. Our result (1) bypasses the bottleneck due to the existing Fourier-analytic approach, (2) enables secure multiplication of secrets, and (3) is near-optimal. We use combinatorial and second-moment techniques to prove the result. Next, we show that the Shamir secret-sharing scheme over a prime-order field F with randomly chosen evaluation places and with threshold k is leakage-resilient to any ℓ -bit joint leakage family of size at most | F| 2k-n-2.01/ (k! · 8 ℓ) with high probability. We prove this result by marrying our proof techniques for the first result with the existing Fourier analytical approach. Moreover, it is unlikely that one can extend this result beyond k/ n⩽ 0.5 due to the technical hurdle for the Fourier-analytic approach.
UR - http://www.scopus.com/inward/record.url?scp=85146645633&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-22318-1_13
DO - 10.1007/978-3-031-22318-1_13
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
SN - 9783031223174
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 355
EP - 383
BT - Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings
A2 - Kiltz, Eike
A2 - Vaikuntanathan, Vinod
PB - Springer Science and Business Media Deutschland GmbH
T2 - 20th Theory of Cryptography Conference, TCC 2022
Y2 - 7 November 2022 through 10 November 2022
ER -