We study non-malleable secret sharing against joint leakage and joint tampering attacks. Our main result is the first threshold secret sharing scheme in the plain model achieving resilience to noisy-leakage and continuous tampering. The above holds under (necessary) minimal computational assumptions (i.e., the existence of one-to-one one-way functions), and in a model where the adversary commits to a fixed partition of all the shares into non-overlapping subsets of at most t- 1 shares (where t is the reconstruction threshold), and subsequently jointly leaks from and tampers with the shares within each partition. We also study the capacity (i.e., the maximum achievable asymptotic information rate) of continuously non-malleable secret sharing against joint continuous tampering attacks. In particular, we prove that whenever the attacker can tamper jointly with k> t/ 2 shares, the capacity is at most t- k. The rate of our construction matches this upper bound. An important corollary of our results is the first non-malleable secret sharing scheme against independent tampering attacks breaking the rate-one barrier (under the same computational assumptions as above).

Continuously Non-malleable Secret Sharing: Joint Tampering, Plain Model and Capacity / Brian, G.; Faonio, A.; Venturi, D.. - 13043:(2021), pp. 333-364. (Intervento presentato al convegno 19th International Conference on Theory of Cryptography, TCC 2021 tenutosi a usa) [10.1007/978-3-030-90453-1_12].

Continuously Non-malleable Secret Sharing: Joint Tampering, Plain Model and Capacity

Brian G.;Venturi D.
2021

Abstract

We study non-malleable secret sharing against joint leakage and joint tampering attacks. Our main result is the first threshold secret sharing scheme in the plain model achieving resilience to noisy-leakage and continuous tampering. The above holds under (necessary) minimal computational assumptions (i.e., the existence of one-to-one one-way functions), and in a model where the adversary commits to a fixed partition of all the shares into non-overlapping subsets of at most t- 1 shares (where t is the reconstruction threshold), and subsequently jointly leaks from and tampers with the shares within each partition. We also study the capacity (i.e., the maximum achievable asymptotic information rate) of continuously non-malleable secret sharing against joint continuous tampering attacks. In particular, we prove that whenever the attacker can tamper jointly with k> t/ 2 shares, the capacity is at most t- k. The rate of our construction matches this upper bound. An important corollary of our results is the first non-malleable secret sharing scheme against independent tampering attacks breaking the rate-one barrier (under the same computational assumptions as above).
2021
19th International Conference on Theory of Cryptography, TCC 2021
Leakage resilience; Non-malleability; Secret sharing
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Continuously Non-malleable Secret Sharing: Joint Tampering, Plain Model and Capacity / Brian, G.; Faonio, A.; Venturi, D.. - 13043:(2021), pp. 333-364. (Intervento presentato al convegno 19th International Conference on Theory of Cryptography, TCC 2021 tenutosi a usa) [10.1007/978-3-030-90453-1_12].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1618013
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 2
social impact