Secret Sharing with Certified Deletion

James Bartusek,Justin Raizes
2024-05-14
Abstract:Secret sharing allows a user to split a secret into many shares so that the secret can be recovered if, and only if, an authorized set of shares is collected. Although secret sharing typically does not require any computational hardness assumptions, its security does require that an adversary cannot collect an authorized set of shares. Over long periods of time where an adversary can benefit from multiple data breaches, this may become an unrealistic assumption.
Cryptography and Security
What problem does this paper attempt to address?