TY - JOUR
T1 - Threshold Secret Sharing Requires a Linear Size Alphabet
AU - Bogdanov, A
AU - Guo, SY
AU - Komargodski, Ilan
PY - 2016
Y1 - 2016
N2 - We prove that for every n and 1 <t <n any t-out-of-n threshold secret sharing scheme for one-bit secrets requires share size log(t + 1). Our bound is tight when t = n - 1 and n is a prime power. In 1990 Kilian and Nisan proved the incomparable bound log(n-t+ 2). Taken together, the two bounds imply that the share size of Shamir's secret sharing scheme (Comm. ACM' 79) is optimal up to an additive constant even for one-bit secrets for the whole range of parameters 1 <t <n. More generally, we show that for all 1 <s <r <n, any ramp secret sharing scheme with secrecy threshold s and reconstruction threshold r requires share size log((r + 1)/(r - s)). As part of our analysis we formulate a simple game-theoretic relaxation of secret sharing for arbitrary access structures. We prove the optimality of our analysis for threshold secret sharing with respect to this method and point out a general limitation.
AB - We prove that for every n and 1 <t <n any t-out-of-n threshold secret sharing scheme for one-bit secrets requires share size log(t + 1). Our bound is tight when t = n - 1 and n is a prime power. In 1990 Kilian and Nisan proved the incomparable bound log(n-t+ 2). Taken together, the two bounds imply that the share size of Shamir's secret sharing scheme (Comm. ACM' 79) is optimal up to an additive constant even for one-bit secrets for the whole range of parameters 1 <t <n. More generally, we show that for all 1 <s <r <n, any ramp secret sharing scheme with secrecy threshold s and reconstruction threshold r requires share size log((r + 1)/(r - s)). As part of our analysis we formulate a simple game-theoretic relaxation of secret sharing for arbitrary access structures. We prove the optimality of our analysis for threshold secret sharing with respect to this method and point out a general limitation.
U2 - 10.1007/978-3-662-53644-5_18
DO - 10.1007/978-3-662-53644-5_18
M3 - موجز برنامج المؤتمر
VL - 9986
SP - 471
EP - 484
JO - THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II
JF - THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II
ER -