Skip to main content

Cutting-edge cryptography through the lens of secret sharing

Author(s): Komargodski, Ilan; Zhandry, Mark

Download
To refer to this page use: http://arks.princeton.edu/ark:/88435/pr1gv7x
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKomargodski, Ilan-
dc.contributor.authorZhandry, Mark-
dc.date.accessioned2021-10-08T19:48:11Z-
dc.date.available2021-10-08T19:48:11Z-
dc.date.issued2018-12en_US
dc.identifier.citationKomargodski, Ilan, and Mark Zhandry. "Cutting-edge cryptography through the lens of secret sharing." Information and Computation 263 (2018): 75-96. doi:10.1016/j.ic.2018.09.011en_US
dc.identifier.issn0890-5401-
dc.identifier.urihttps://www.cs.princeton.edu/~mzhandry/docs/papers/DSS.pdf-
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/pr1gv7x-
dc.description.abstractSecret sharing is a mechanism by which a trusted dealer holding a secret “splits” the secret into many “shares” and distributes the shares to a collection of parties. Associated with the sharing is a monotone access structure, that specifies which parties are “qualified” and which are not: any qualified subset of parties can (efficiently) reconstruct the secret, but no unqualified subset can learn anything about the secret. In the most general form of secret sharing, the access structure can be any monotone language. In this work, we consider two very natural extensions of secret sharing. In the first, which we call distributed secret sharing, there is no trusted dealer at all, and it can be thought of as combining the features of multiparty non-interactive key exchange and standard secret sharing. Qualified sets can agree on a key which remains pseudorandom for unqualified sets. Our second notion is called functional secret sharing, which incorporates some of the features of functional encryption into secret sharing by providing more fine-grained access to the secret. Qualified subsets of parties do not learn the secret, but instead learn some function applied to the secret, with each set of parties potentially learning a different function. Our main result is that both of the extensions above are equivalent to several recent cutting-edge primitives. In particular, general-purpose distributed secret sharing is equivalent to witness PRFs, and general-purpose functional secret sharing is equivalent to indistinguishability obfuscation. Thus, our work shows that it is possible to view some of the recent developments in cryptography through a secret sharing lens, yielding new insights about both these cutting-edge primitives and secret sharing.en_US
dc.format.extent75 - 96en_US
dc.language.isoen_USen_US
dc.relation.ispartofInformation and Computationen_US
dc.rightsAuthor's manuscripten_US
dc.titleCutting-edge cryptography through the lens of secret sharingen_US
dc.typeJournal Articleen_US
dc.identifier.doidoi:10.1016/j.ic.2018.09.011-
pu.type.symplectichttp://www.symplectic.co.uk/publications/atom-terms/1.0/journal-articleen_US

Files in This Item:
File Description SizeFormat 
CuttingEdgeCryptographySecretSharing.pdf1.31 MBAdobe PDFView/Download


Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.