Secret Sharing with Certified Deletion
- URL: http://arxiv.org/abs/2405.08117v1
- Date: Mon, 13 May 2024 19:01:08 GMT
- Title: Secret Sharing with Certified Deletion
- Authors: James Bartusek, Justin Raizes,
- Abstract summary: Secret sharing allows a user to split a secret into many shares so that the secret can be recovered if, and only if, an authorized set of shares is collected.
In secret sharing with certified deletion, a (classical) secret is split into quantum shares which can be verifiably destroyed.
We show how to construct (i) a secret sharing scheme with no-signaling certified deletion for any monotone access structure, and (ii) a threshold secret sharing scheme with adaptive certified deletion.
- Score: 4.082216579462796
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Secret sharing allows a user to split a secret into many shares so that the secret can be recovered if, and only if, an authorized set of shares is collected. Although secret sharing typically does not require any computational hardness assumptions, its security does require that an adversary cannot collect an authorized set of shares. Over long periods of time where an adversary can benefit from multiple data breaches, this may become an unrealistic assumption. We initiate the systematic study of secret sharing with certified deletion in order to achieve security even against an adversary that eventually collects an authorized set of shares. In secret sharing with certified deletion, a (classical) secret is split into quantum shares which can be verifiably destroyed. We define two natural notions of security: no-signaling security and adaptive security. Next, we show how to construct (i) a secret sharing scheme with no-signaling certified deletion for any monotone access structure, and (ii) a threshold secret sharing scheme with adaptive certified deletion. Our first construction uses Bartusek and Khurana's (CRYPTO 2023) 2-out-of-2 secret sharing scheme with certified deletion as a building block, while our second construction is built from scratch and requires several new technical ideas. For example, we significantly generalize the ``XOR extractor'' of Agarwal, Bartusek, Khurana, and Kumar (EUROCRYPT 2023) in order to obtain high rate seedless extraction from certain quantum sources of entropy.
Related papers
- Unclonable Secret Sharing [18.564937506648622]
Unclonable cryptography utilizes the principles of quantum mechanics to addresses cryptographic tasks that are impossible classically.
We introduce a novel unclonable primitive in the context of secret sharing, called unclonable secret sharing (USS)
arXiv Detail & Related papers (2024-06-16T16:50:15Z) - Advance Sharing with Ogawa et al.'s Ramp Quantum Secret Sharing Scheme [0.4604003661048266]
We propose a method to distribute some shares before a secret is given in Ogawa et al.'s scheme.
We then determine a necessary and sufficient condition on sets of shares that can be distributed before a given secret.
arXiv Detail & Related papers (2024-04-24T04:58:31Z) - Non-Adaptive Coding for Two-Way Wiretap Channel with or without Cost Constraints [45.65636963872864]
We study the secrecy results for the two-way wiretap channel (TW-WC) with an external eavesdropper under a strong secrecy metric.
We derive inner bounds on the secrecy capacity regions for the TW-WC under strong joint and individual secrecy constraints.
arXiv Detail & Related papers (2023-10-21T01:05:59Z) - Quantum Secret Reconstruction [2.8233507229238177]
This paper proposes the first quantum secret reconstruction protocol based on cluster states.
It is shown that the proposed protocol is secure against several common attacks.
arXiv Detail & Related papers (2023-06-15T05:24:29Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Advance sharing of quantum shares for quantum secrets [2.2843885788439793]
Secret sharing is a cryptographic scheme to encode a secret to multiple shares being distributed to participants.
We propose a quantum secret sharing scheme for quantum secrets that can distribute some shares before a given secret.
arXiv Detail & Related papers (2023-02-28T09:51:57Z) - ByzSecAgg: A Byzantine-Resistant Secure Aggregation Scheme for Federated
Learning Based on Coded Computing and Vector Commitment [90.60126724503662]
ByzSecAgg is an efficient secure aggregation scheme for federated learning.
ByzSecAgg is protected against Byzantine attacks and privacy leakages.
arXiv Detail & Related papers (2023-02-20T11:15:18Z) - Protecting Split Learning by Potential Energy Loss [70.81375125791979]
We focus on the privacy leakage from the forward embeddings of split learning.
We propose the potential energy loss to make the forward embeddings become more 'complicated'
arXiv Detail & Related papers (2022-10-18T06:21:11Z) - Hiding Images in Deep Probabilistic Models [58.23127414572098]
We describe a different computational framework to hide images in deep probabilistic models.
Specifically, we use a DNN to model the probability density of cover images, and hide a secret image in one particular location of the learned distribution.
We demonstrate the feasibility of our SinGAN approach in terms of extraction accuracy and model security.
arXiv Detail & Related papers (2022-10-05T13:33:25Z) - Advance sharing of quantum shares for classical secrets [2.2843885788439793]
Secret sharing schemes for classical secrets can be classified into classical secret sharing schemes and quantum secret sharing schemes.
We propose quantum secret sharing with the capabilities in designing of access structures more flexibly.
arXiv Detail & Related papers (2022-08-03T05:25:19Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.