Papers
Topics
Authors
Recent
Search
2000 character limit reached

Democratic Ramp Secret Sharing

Published 23 Dec 2024 in cs.IT and math.IT | (2412.17987v2)

Abstract: In this work we revisit the fundamental findings by Chen et al. in [5] on general information transfer in linear ramp secret sharing schemes to conclude that their method not only gives a way to establish worst case leakage [5, 25] and best case recovery [5, 19], but can also lead to additional insight on non-qualifying sets for any prescribed amount of information. We then apply this insight to schemes defined from monomial-Cartesian codes and by doing so we demonstrate that the good schemes from Sec.\ IV in [14] have a second layer of security. Elaborating further, when given a designed recovery number, in a new construction the focus is entirely on ensuring that the access structure possesses desirable second layer security, rather on what is the worst case information leakage in terms of number of participants. The particular structure of largest possible sets being not able to determine given amount of information suggests that we call such schemes democratic

Summary

  • The paper presents democratic ramp secret sharing, utilizing nested linear codes like monomial-Cartesian codes to define schemes with improved parameters and a secondary security layer.
  • Numerical results show democratic schemes built with these codes offer superior privacy and reconstruction parameters, with non-i-qualifying sets exceeding privacy bounds for enhanced fairness.
  • The findings provide new theoretical and practical approaches for more equitable and secure secret sharing, particularly useful for environments with complex access requirements.

An Overview of Democratic Ramp Secret Sharing

This paper presents a detailed exploration of linear ramp secret sharing schemes, revisiting and extending the findings of prior works by Chen et al. and other researchers. The focus of the paper is on examining the potential for additional security layers within these schemes and introducing the concept of "democratic secret sharing".

Technical Findings

Central to this study is the application of nested linear codes and their properties, such as relative generalized Hamming weights, to define linear ramp secret sharing schemes. The author revisits the relationship between these properties and the parameters that characterize secret sharing, such as privacy number tt and recovery number rr. The author notably reformulates Theorem 10 from Chen et al. to provide a new perspective on determining the access structure of such schemes, which has not been fully explored in the literature.

The work demonstrates that, in addition to defining the limits of secrecy and recoverability, the structured use of monomial-Cartesian codes can achieve a second layer of security. The introduction of "democratic secret sharing" emphasizes constructing schemes that maintain systematic structures in their non-qualifying sets, which can be desirable in practice to prevent bias against any participant subset.

Numerical Results

The paper lays out detailed results showing how monomial-Cartesian codes provide families of secret sharing schemes with superior privacy and reconstruction parameters compared to previous simplistic constructions. Particularly, the developed democratic schemes display parameters such as maximal non-i-qualifying set sizes that greatly exceed the expected privacy bound tt. These results prove advantageous for ensuring that large participant groups cannot gain non-commensurate amounts of information.

Implications

The implications of these findings for theoretical and applied cryptography are significant. This research enriches the understanding of linear secret sharing schemes by illustrating how nested linear codes can optimize both straightforward recovery properties and secondary security layers. Practically, democratic schemes may be especially useful for environments prone to complex access requirements, which necessitate maintaining fairness and confidentiality amidst diverse participant structures.

Future Developments

Given the investigatory scope outlined in the concluding section, further research could enrich the area by exploring additional constructs of democratic secret sharing schemes beyond those currently described. Investigations into specific algebraic structures, such as those derived from Hermitian or norm-trace curves, may reveal new or refined possibilities for efficient and secure secret sharing. Moreover, applied enhancements leveraging the order bound on dual codes could extend the theoretical rigor of multivariate polynomial analysis in secret sharing contexts.

Conclusion

This paper significantly contributes to the cryptography field by presenting democratic secret sharing as an approach that not only maintains robust recovery and privacy metrics but also adheres to fair and systematic participant inclusion. By offering new theoretical interpretations and practical constructions, this research challenges existing paradigms and opens avenues for more equitable and secure cryptographic practices.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Authors (1)

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 2 tweets with 4 likes about this paper.