Leakage-Resilient Secret Sharing in Non-compartmentalized Models. Lin, F., Cheraghchi, M., Guruswami, V., Safavi-Naini, R., & Wang, H. In Proceedings of the Conference on Information-Theoretic Cryptography (ITC), volume 163, of Leibniz International Proceedings in Informatics (LIPIcs), pages 7:1–7:24, 2020. Link Paper doi abstract bibtex Non-malleable secret sharing was recently proposed by Goyal and Kumar in independent tampering and joint tampering models for threshold secret sharing (STOC18) and secret sharing with general access structure (CRYPTO18). The idea of making secret sharing non-malleable received great attention and by now has generated many papers exploring new frontiers in this topic, such as multiple-time tampering and adding leakage resiliency to the one-shot tampering model. Non-compartmentalized tampering model was first studied by Agrawal et.al (CRYPTO15) for non-malleability against permutation composed with bit-wise independent tampering, and shown useful in constructing non-malleable string commitments. In spite of strong demands in application, there are only a few tampering families studied in non-compartmentalized model, due to the fact that compartmentalization (assuming that the adversary can not access all pieces of sensitive data at the same time) is crucial for most of the known techniques. We initiate the study of leakage-resilient secret sharing in the non-compartmentalized model. Leakage in leakage-resilient secret sharing is usually modelled as arbitrary functions with bounded total output length applied to each share or up to a certain number of shares (but never the full share vector) at one time. Arbitrary leakage functions, even with one bit output, applied to the full share vector is impossible to resist since the reconstruction algorithm itself can be used to construct a contradiction. We allow the leakage functions to be applied to the full share vector (non-compartmentalized) but restrict to the class of affine leakage functions. The leakage adversary can corrupt several players and obtain their shares, as in normal secret sharing. The leakage adversary can apply arbitrary affine functions with bounded total output length to the full share vector and obtain the outputs as leakage. These two processes can be both non-adaptive and do not depend on each other, or both adaptive and depend on each other with arbitrary ordering. We use a generic approach that combines randomness extractors with error correcting codes to construct such leakage-resilient secret sharing schemes, and achieve constant information ratio (the scheme for non-adaptive adversary is near optimal). We then explore making the non-compartmentalized leakage-resilient secret sharing also non-malleable against tampering. We consider a tampering model, where the adversary can use the shares obtained from the corrupted players and the outputs of the global leakage functions to choose a tampering function from a tampering family $\mathcal{F}$. We give two constructions of such leakage-resilient non-malleable secret sharing for the case $\mathcal{F}$ is the bit-wise independent tampering and, respectively, for the case $\mathcal{F}$ is the affine tampering functions, the latter is non-compartmentalized tampering that subsumes the permutation composed with bit-wise independent tampering mentioned above.
@INPROCEEDINGS{ref:LCGSW20,
author = {Fuchun Lin and Mahdi Cheraghchi and Venkatesan
Guruswami and Reihaneh Safavi-Naini and Huaxiong
Wang},
title = {Leakage-Resilient Secret Sharing in
Non-compartmentalized Models},
year = 2020,
booktitle = {Proceedings of the {Conference on
Information-Theoretic Cryptography (ITC)}},
pages = {7:1--7:24},
volume = 163,
series = {Leibniz International Proceedings in Informatics
(LIPIcs)},
url_Link = {https://drops.dagstuhl.de/opus/volltexte/2020/12112},
url_Paper = {https://arxiv.org/abs/1902.06195},
doi = {10.4230/LIPIcs.ITC.2020.7},
keywords = {Leakage-resilient cryptography, Secret sharing
scheme, Randomness extractor},
abstract = {Non-malleable secret sharing was recently proposed
by Goyal and Kumar in independent tampering and
joint tampering models for threshold secret sharing
(STOC18) and secret sharing with general access
structure (CRYPTO18). The idea of making secret
sharing non-malleable received great attention and
by now has generated many papers exploring new
frontiers in this topic, such as multiple-time
tampering and adding leakage resiliency to the
one-shot tampering model. Non-compartmentalized
tampering model was first studied by Agrawal et.al
(CRYPTO15) for non-malleability against permutation
composed with bit-wise independent tampering, and
shown useful in constructing non-malleable string
commitments. In spite of strong demands in
application, there are only a few tampering families
studied in non-compartmentalized model, due to the
fact that compartmentalization (assuming that the
adversary can not access all pieces of sensitive
data at the same time) is crucial for most of the
known techniques. We initiate the study of
leakage-resilient secret sharing in the
non-compartmentalized model. Leakage in
leakage-resilient secret sharing is usually modelled
as arbitrary functions with bounded total output
length applied to each share or up to a certain
number of shares (but never the full share vector)
at one time. Arbitrary leakage functions, even with
one bit output, applied to the full share vector is
impossible to resist since the reconstruction
algorithm itself can be used to construct a
contradiction. We allow the leakage functions to be
applied to the full share vector
(non-compartmentalized) but restrict to the class of
affine leakage functions. The leakage adversary can
corrupt several players and obtain their shares, as
in normal secret sharing. The leakage adversary can
apply arbitrary affine functions with bounded total
output length to the full share vector and obtain
the outputs as leakage. These two processes can be
both non-adaptive and do not depend on each other,
or both adaptive and depend on each other with
arbitrary ordering. We use a generic approach that
combines randomness extractors with error correcting
codes to construct such leakage-resilient secret
sharing schemes, and achieve constant information
ratio (the scheme for non-adaptive adversary is near
optimal). We then explore making the
non-compartmentalized leakage-resilient secret
sharing also non-malleable against tampering. We
consider a tampering model, where the adversary can
use the shares obtained from the corrupted players
and the outputs of the global leakage functions to
choose a tampering function from a tampering family
$\mathcal{F}$. We give two constructions of such
leakage-resilient non-malleable secret sharing for
the case $\mathcal{F}$ is the bit-wise independent
tampering and, respectively, for the case
$\mathcal{F}$ is the affine tampering functions, the
latter is non-compartmentalized tampering that
subsumes the permutation composed with bit-wise
independent tampering mentioned above. }
}
Downloads: 0
{"_id":"LcPKJep6qA8XCEyqt","bibbaseid":"lin-cheraghchi-guruswami-safavinaini-wang-leakageresilientsecretsharinginnoncompartmentalizedmodels-2020","authorIDs":["2n8MNophuzbeevTa8","3NEcSaujokmJYSDaa","3tFWxWs2qWeYAZx9a","4QNcMTdRiWr2gs8Sk","5KoQWR3vSjnsoZNz5","5i4QHRc5LGio8Mf5u","62bYDgAFwCxaQ4Q9T","685mTysGDdQJKGxEE","6sX76eTffL7p76peN","8NLx3B3FAvaK54hSK","9NZpjMJLG7dNWroGm","9aD4MPX9ELhsyJmaR","9aFgrqcc4j28kZn8n","A9wAgP7TPK9tw28qY","BJ6h7zrsT3L89RKSg","BWL9E9QxvrST7y7ym","Cht4qGZ9eYAvPygNC","D3NMRJpac7Z2oFz7x","EiL6Xv4GTWGB97B8H","F3Y934eNyTeEJsg6E","FDEj5Zwdm28pFcAnB","FJdyLy2TL3v973ge8","GxccwstJJuJ4rg7Dq","H4D7r27RcPALT5DCs","HP7szFXWBWFXXZhdA","HRX7xsd7ZkTNvr67D","Hj3KN5PTNMST8hD3b","JEvEPvDBYNNXgGBnp","JYpde2ppjXLva6cre","KFgC2dZG7jXYAgZ3T","NRg9mmaSB55QqzNnH","NWCEkq6XqRBCiGmMe","NpGaG45evixRFDMiF","NyDiXeBc7cuxdWrqh","P6pva6vpPZCz6ndh9","Py2jfYGNZKNt7nxL6","Q6E9aDkYPcbhngLMx","QYrXKExv3BPABZGyA","QupQWsidagmv2nu8Z","SGZ2YignSm7njeTxy","SSuyWxzudqBDgAosw","THz3CmRmH3zZ9Xfud","TTEBJzPHwrY4d2Qfi","Wzr7kB4bxMDqceidA","YedfCw6zcDLoWAWFL","YqipZGeRZYdKe4qK8","YtTEuSL9GJ8pkKcZw","Z3w2d32WjDczZMeGo","aduB2YE7dcNtbHnAN","c8gPvTXFPd9NazgEw","d6HAadRZAtz97Y2so","dTBDNYCcYKNNdhqaR","ezDt3Lb3Q6Sbo2rfX","fXtxgjbjZswBmF45i","ftBpmnKRHoB2muB8u","gKxHau44e8gnmxs6v","hM29eSWZbASnmDdFf","hw7Q4GHDAHkLTAyeB","i6Ns5rSW8R3ifxeHg","jJcoL4QWRkJQ59LfW","kKvRZ55rH7sfbubS2","kdfqsAMqCFDhpuW3S","koPTGcsAkwhGbkAYe","manxWg6Q3ZC5vW4JE","pwN2yYKo5DdSDaZGs","qpSgMrJ8WQNupjbXX","sD5Wq95oeSzqGF9kn","uSGLWGoXjyDyozeEy","wCcpScxkvg5RkcmWm","xKz7kx4eXbnkHeNXP","xeiij9YsbXBbMjciP","yGxZz3yuu6krMRxgK","yjJrpKY5QmDe8SXvm","zaR6PwJ7aC9xWBpiy"],"author_short":["Lin, F.","Cheraghchi, M.","Guruswami, V.","Safavi-Naini, R.","Wang, H."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Fuchun"],"propositions":[],"lastnames":["Lin"],"suffixes":[]},{"firstnames":["Mahdi"],"propositions":[],"lastnames":["Cheraghchi"],"suffixes":[]},{"firstnames":["Venkatesan"],"propositions":[],"lastnames":["Guruswami"],"suffixes":[]},{"firstnames":["Reihaneh"],"propositions":[],"lastnames":["Safavi-Naini"],"suffixes":[]},{"firstnames":["Huaxiong"],"propositions":[],"lastnames":["Wang"],"suffixes":[]}],"title":"Leakage-Resilient Secret Sharing in Non-compartmentalized Models","year":"2020","booktitle":"Proceedings of the Conference on Information-Theoretic Cryptography (ITC)","pages":"7:1–7:24","volume":"163","series":"Leibniz International Proceedings in Informatics (LIPIcs)","url_link":"https://drops.dagstuhl.de/opus/volltexte/2020/12112","url_paper":"https://arxiv.org/abs/1902.06195","doi":"10.4230/LIPIcs.ITC.2020.7","keywords":"Leakage-resilient cryptography, Secret sharing scheme, Randomness extractor","abstract":"Non-malleable secret sharing was recently proposed by Goyal and Kumar in independent tampering and joint tampering models for threshold secret sharing (STOC18) and secret sharing with general access structure (CRYPTO18). The idea of making secret sharing non-malleable received great attention and by now has generated many papers exploring new frontiers in this topic, such as multiple-time tampering and adding leakage resiliency to the one-shot tampering model. Non-compartmentalized tampering model was first studied by Agrawal et.al (CRYPTO15) for non-malleability against permutation composed with bit-wise independent tampering, and shown useful in constructing non-malleable string commitments. In spite of strong demands in application, there are only a few tampering families studied in non-compartmentalized model, due to the fact that compartmentalization (assuming that the adversary can not access all pieces of sensitive data at the same time) is crucial for most of the known techniques. We initiate the study of leakage-resilient secret sharing in the non-compartmentalized model. Leakage in leakage-resilient secret sharing is usually modelled as arbitrary functions with bounded total output length applied to each share or up to a certain number of shares (but never the full share vector) at one time. Arbitrary leakage functions, even with one bit output, applied to the full share vector is impossible to resist since the reconstruction algorithm itself can be used to construct a contradiction. We allow the leakage functions to be applied to the full share vector (non-compartmentalized) but restrict to the class of affine leakage functions. The leakage adversary can corrupt several players and obtain their shares, as in normal secret sharing. The leakage adversary can apply arbitrary affine functions with bounded total output length to the full share vector and obtain the outputs as leakage. These two processes can be both non-adaptive and do not depend on each other, or both adaptive and depend on each other with arbitrary ordering. We use a generic approach that combines randomness extractors with error correcting codes to construct such leakage-resilient secret sharing schemes, and achieve constant information ratio (the scheme for non-adaptive adversary is near optimal). We then explore making the non-compartmentalized leakage-resilient secret sharing also non-malleable against tampering. We consider a tampering model, where the adversary can use the shares obtained from the corrupted players and the outputs of the global leakage functions to choose a tampering function from a tampering family $\\mathcal{F}$. We give two constructions of such leakage-resilient non-malleable secret sharing for the case $\\mathcal{F}$ is the bit-wise independent tampering and, respectively, for the case $\\mathcal{F}$ is the affine tampering functions, the latter is non-compartmentalized tampering that subsumes the permutation composed with bit-wise independent tampering mentioned above. ","bibtex":"@INPROCEEDINGS{ref:LCGSW20,\n author =\t {Fuchun Lin and Mahdi Cheraghchi and Venkatesan\n Guruswami and Reihaneh Safavi-Naini and Huaxiong\n Wang},\n title =\t {Leakage-Resilient Secret Sharing in\n Non-compartmentalized Models},\n year =\t 2020,\n booktitle =\t {Proceedings of the {Conference on\n Information-Theoretic Cryptography (ITC)}},\n pages =\t {7:1--7:24},\n volume =\t 163,\n series =\t {Leibniz International Proceedings in Informatics\n (LIPIcs)},\n url_Link =\t {https://drops.dagstuhl.de/opus/volltexte/2020/12112},\n url_Paper =\t {https://arxiv.org/abs/1902.06195},\n doi =\t\t {10.4230/LIPIcs.ITC.2020.7},\n keywords =\t {Leakage-resilient cryptography, Secret sharing\n scheme, Randomness extractor},\n abstract =\t {Non-malleable secret sharing was recently proposed\n by Goyal and Kumar in independent tampering and\n joint tampering models for threshold secret sharing\n (STOC18) and secret sharing with general access\n structure (CRYPTO18). The idea of making secret\n sharing non-malleable received great attention and\n by now has generated many papers exploring new\n frontiers in this topic, such as multiple-time\n tampering and adding leakage resiliency to the\n one-shot tampering model. Non-compartmentalized\n tampering model was first studied by Agrawal et.al\n (CRYPTO15) for non-malleability against permutation\n composed with bit-wise independent tampering, and\n shown useful in constructing non-malleable string\n commitments. In spite of strong demands in\n application, there are only a few tampering families\n studied in non-compartmentalized model, due to the\n fact that compartmentalization (assuming that the\n adversary can not access all pieces of sensitive\n data at the same time) is crucial for most of the\n known techniques. We initiate the study of\n leakage-resilient secret sharing in the\n non-compartmentalized model. Leakage in\n leakage-resilient secret sharing is usually modelled\n as arbitrary functions with bounded total output\n length applied to each share or up to a certain\n number of shares (but never the full share vector)\n at one time. Arbitrary leakage functions, even with\n one bit output, applied to the full share vector is\n impossible to resist since the reconstruction\n algorithm itself can be used to construct a\n contradiction. We allow the leakage functions to be\n applied to the full share vector\n (non-compartmentalized) but restrict to the class of\n affine leakage functions. The leakage adversary can\n corrupt several players and obtain their shares, as\n in normal secret sharing. The leakage adversary can\n apply arbitrary affine functions with bounded total\n output length to the full share vector and obtain\n the outputs as leakage. These two processes can be\n both non-adaptive and do not depend on each other,\n or both adaptive and depend on each other with\n arbitrary ordering. We use a generic approach that\n combines randomness extractors with error correcting\n codes to construct such leakage-resilient secret\n sharing schemes, and achieve constant information\n ratio (the scheme for non-adaptive adversary is near\n optimal). We then explore making the\n non-compartmentalized leakage-resilient secret\n sharing also non-malleable against tampering. We\n consider a tampering model, where the adversary can\n use the shares obtained from the corrupted players\n and the outputs of the global leakage functions to\n choose a tampering function from a tampering family\n $\\mathcal{F}$. We give two constructions of such\n leakage-resilient non-malleable secret sharing for\n the case $\\mathcal{F}$ is the bit-wise independent\n tampering and, respectively, for the case\n $\\mathcal{F}$ is the affine tampering functions, the\n latter is non-compartmentalized tampering that\n subsumes the permutation composed with bit-wise\n independent tampering mentioned above. }\n}\n\n","author_short":["Lin, F.","Cheraghchi, M.","Guruswami, V.","Safavi-Naini, R.","Wang, H."],"key":"ref:LCGSW20","id":"ref:LCGSW20","bibbaseid":"lin-cheraghchi-guruswami-safavinaini-wang-leakageresilientsecretsharinginnoncompartmentalizedmodels-2020","role":"author","urls":{" link":"https://drops.dagstuhl.de/opus/volltexte/2020/12112"," paper":"https://arxiv.org/abs/1902.06195"},"keyword":["Leakage-resilient cryptography","Secret sharing scheme","Randomness extractor"],"metadata":{"authorlinks":{"cheraghchi, m":"https://mahdi.ch/"}}},"bibtype":"inproceedings","biburl":"http://mahdi.ch/writings/cheraghchi.bib","creationDate":"2020-05-28T16:03:44.431Z","downloads":6,"keywords":["leakage-resilient cryptography","secret sharing scheme","randomness extractor"],"search_terms":["leakage","resilient","secret","sharing","non","compartmentalized","models","lin","cheraghchi","guruswami","safavi-naini","wang"],"title":"Leakage-Resilient Secret Sharing in Non-compartmentalized Models","year":2020,"dataSources":["YZqdBBx6FeYmvQE6D"]}