Stochastic Secret Sharing with 1-Bit Shares and Applications to MPC

Benny Applebaum, Eliran Kachlon

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The problem of minimizing the share size of threshold secret-sharing schemes is a basic research question that has been extensively studied. Ideally, one strives for schemes in which the share size equals the secret size. While this is achievable for large secrets (Shamir, CACM ’79), no similar solutions are known for the case of binary, single-bit secrets. Current approaches often rely on so-called ramp secret sharing that achieves a constant share size at the expense of a slight gap between the privacy and the correctness thresholds. In the case of single-bit shares, this leads to a large gap which is typically unacceptable. The possibility of a meaningful notion of secret sharing scheme with 1-bit shares and almost optimal threshold has been left wide open. Of special interest is the case of threshold 0.5, which is motivated by information-theoretic honest-majority secure multiparty computation (MPC). In this work, we present a new stochastic model for secret-sharing where each party is corrupted by the adversary with probability p, independently of the other parties, and correctness and privacy are required to hold with high probability over the choice of the corrupt parties. We present new secret sharing schemes with single-bit shares that tolerate any constant corruption probability p<0.5. Our construction is based on a novel connection between such stochastic secret-sharing schemes and error-correcting codes that achieve capacity over the binary erasure channel. Our schemes are linear and multiplicative. We demonstrate the usefulness of the model by using our new schemes to construct MPC protocols with security against an adversary that passively corrupts an arbitrary subset of 0.499n of the parties, where the online communication per party consists of a single bit per AND gate and zero communication per XOR gate. Unlike competing approaches for communication-efficient MPC, our solution is applicable even in a real-time model in which the parties should compute a Boolean circuit whose gates arrive in real-time, one at a time, and are not known in advance.

Original languageEnglish
Title of host publicationAdvances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings
EditorsLeonid Reyzin, Douglas Stebila
PublisherSpringer Science and Business Media Deutschland GmbH
Pages286-320
Number of pages35
ISBN (Print)9783031683879
DOIs
StatePublished - 2024
Event44th Annual International Cryptology Conference, CRYPTO 2024 - Santa Barbara, United States
Duration: 18 Aug 202422 Aug 2024

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume14924 LNCS

Conference

Conference44th Annual International Cryptology Conference, CRYPTO 2024
Country/TerritoryUnited States
CitySanta Barbara
Period18/08/2422/08/24

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Cite this