Evolving Secret Sharing Schemes Based on Polynomial Evaluations and Algebraic Geometry Codes
Chaoping Xing,Chen Yuan
DOI: https://doi.org/10.1109/tit.2024.3379278
IF: 2.5
2024-01-01
IEEE Transactions on Information Theory
Abstract:A secret sharing scheme enables the dealer to share a secret among n parties. A classic secret sharing scheme takes the number n of parties and the secret as the input. If n is not known in advance, the classic secret sharing scheme may fail. Komargodski, Naor, and Yogev [8] first proposed the evolving secret sharing scheme that only takes the secret as the input. In the work [8], [9], and [2], evolving threshold and ramp secret sharing schemes were extensively investigated. However, all of their constructions except for the first construction in [2] are inspired by the scheme given in [8], namely, these schemes rely on the scheme for st-connectivity which allows to generate infinite number of shares. In this work, we revisit evolving secret sharing schemes and present three constructions that take completely different approach. Our first scheme is an evolving k-threshold secret sharing scheme with share size k1+ϵ log t for any constant ϵ > 0. Thus, our scheme achieves almost the same share size as in [8]. Moreover, our scheme is obtained by a direct construction while the scheme in [8] that achieves the (k - 1) log t share size is obtained by a recursive construction, which makes their structure complicated. Our second scheme is an evolving kt-threshold secret sharing scheme with any sequence {kt}∞ t=1 of threshold values that has share size t4. This scheme improves the share size by log t given in [9], where a dynamic evolving kt-threshold secret sharing scheme with the share size O(t4 log t) was proposed. In addition, we also show that if the threshold values kt grow in rate ⌊tβ⌋ for a real β ∈ (0, 1), then we have a dynamic evolving threshold secret sharing scheme with the share size O(t4β). Our last scheme is an evolving (αt, βt)-ramp secret sharing scheme with constant share size for some α, β. One major feature of this ramp scheme is that it is multiplicative as the scheme is also an arithmetic secret sharing scheme. We note that the same technique in [9] can also transform all of our schemes to a robust scheme as our scheme is linear.
computer science, information systems,engineering, electrical & electronic